0x20 14:44:02 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x5, 0x8, 0x1, r1}) 14:44:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) [ 1846.365456][T11146] ? __phys_addr_symbol+0x30/0x70 [ 1846.370501][T11146] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1846.376241][T11146] ? __check_object_size+0x3d/0x42f [ 1846.381459][T11146] ? copy_strings_kernel+0x110/0x110 [ 1846.386759][T11146] ? strncpy_from_user+0x2a8/0x380 [ 1846.391895][T11146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.398160][T11146] __ia32_compat_sys_execveat+0xf3/0x140 [ 1846.403816][T11146] do_fast_syscall_32+0x281/0xc98 [ 1846.408864][T11146] entry_SYSENTER_compat+0x70/0x7f [ 1846.413979][T11146] RIP: 0023:0xf7fc6869 [ 1846.413996][T11146] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1846.414003][T11146] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1846.437761][T11146] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1846.437770][T11146] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 14:44:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfc00]}}, 0x1c) geteuid() 14:44:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x0, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) [ 1846.437778][T11146] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1846.437786][T11146] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1846.437794][T11146] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1846.498461][ C0] net_ratelimit: 1 callbacks suppressed [ 1846.498472][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:02 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xaeef, 0x2000000032, 0x2000000, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r1, 0x0) 14:44:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:02 executing program 0 (fault-call:2 fault-nth:9): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfe80]}}, 0x1c) geteuid() 14:44:02 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xf4, 0x480800) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000100)={0x5, 0x0, 0x6, 0x5881, 0x2, 0x7}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) 14:44:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:02 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x40000, 0x0) mlockall(0x4) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x2, 0x70bd26, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x80) dup3(0xffffffffffffffff, r1, 0x0) prctl$PR_GET_DUMPABLE(0x3) 14:44:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x0, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:03 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) [ 1846.917280][T12023] FAULT_INJECTION: forcing a failure. [ 1846.917280][T12023] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.945825][T12023] CPU: 0 PID: 12023 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1846.953856][T12023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1846.963923][T12023] Call Trace: 14:44:03 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x3, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000100)=0x1) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) fgetxattr(r1, &(0x7f0000000180)=@known='trusted.overlay.opaque\x00', &(0x7f00000001c0)=""/23, 0x17) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x6) [ 1846.967237][T12023] dump_stack+0x172/0x1f0 [ 1846.971601][T12023] should_fail.cold+0xa/0x15 [ 1846.976300][T12023] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1846.976327][T12023] ? ___might_sleep+0x163/0x280 [ 1846.976346][T12023] __should_failslab+0x121/0x190 [ 1846.976361][T12023] should_failslab+0x9/0x14 [ 1846.976379][T12023] kmem_cache_alloc+0x2b2/0x6f0 [ 1846.976394][T12023] ? kasan_check_read+0x11/0x20 [ 1846.976413][T12023] __alloc_file+0x27/0x300 [ 1846.987065][T12023] alloc_empty_file+0x72/0x170 [ 1846.987084][T12023] path_openat+0xef/0x46e0 [ 1846.987113][T12023] ? save_stack+0xa9/0xd0 [ 1846.987128][T12023] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1846.987140][T12023] ? __kmalloc+0x15c/0x740 [ 1846.987152][T12023] ? security_prepare_creds+0x123/0x190 [ 1846.987165][T12023] ? prepare_creds+0x2f5/0x3f0 [ 1846.987178][T12023] ? prepare_exec_creds+0x12/0xf0 [ 1846.987193][T12023] ? __do_execve_file.isra.0+0x393/0x23f0 [ 1846.987207][T12023] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 1846.987222][T12023] ? do_fast_syscall_32+0x281/0xc98 [ 1846.987235][T12023] ? entry_SYSENTER_compat+0x70/0x7f [ 1846.987262][T12023] ? __lock_acquire+0x548/0x3fb0 [ 1847.029673][T12023] ? prepare_exec_creds+0x12/0xf0 [ 1847.029695][T12023] do_filp_open+0x1a1/0x280 [ 1847.029716][T12023] ? may_open_dev+0x100/0x100 [ 1847.055145][T12023] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1847.096148][T12023] ? find_held_lock+0x35/0x130 [ 1847.100943][T12023] ? __lock_acquire+0x548/0x3fb0 [ 1847.105925][T12023] do_open_execat+0x137/0x690 [ 1847.111927][T12023] ? unregister_binfmt+0x170/0x170 14:44:03 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(0xffffffffffffffff, r1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xa8, r3, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_LINK={0x28, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x4c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x90a}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7b58}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4}, 0x40000) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000240)) [ 1847.117062][T12023] ? lock_downgrade+0x880/0x880 [ 1847.121944][T12023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.128216][T12023] ? kasan_check_read+0x11/0x20 [ 1847.133096][T12023] ? do_raw_spin_unlock+0x57/0x270 [ 1847.138219][T12023] __do_execve_file.isra.0+0x178d/0x23f0 [ 1847.138234][T12023] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1847.138263][T12023] ? copy_strings_kernel+0x110/0x110 [ 1847.138277][T12023] ? strncpy_from_user+0x2a8/0x380 [ 1847.138294][T12023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.138316][T12023] __ia32_compat_sys_execveat+0xf3/0x140 [ 1847.138334][T12023] do_fast_syscall_32+0x281/0xc98 [ 1847.138353][T12023] entry_SYSENTER_compat+0x70/0x7f [ 1847.138365][T12023] RIP: 0023:0xf7fc6869 [ 1847.138378][T12023] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1847.138390][T12023] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 14:44:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfec0]}}, 0x1c) geteuid() [ 1847.166874][T12023] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1847.166884][T12023] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1847.166893][T12023] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1847.166901][T12023] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1847.166910][T12023] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:03 executing program 0 (fault-call:2 fault-nth:10): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:03 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400000) setsockopt$packet_buf(r2, 0x107, 0x7, &(0x7f0000000100)="4e966c2b14c7befce94770130da43d9c9b6e14b565048278589bbf998a205216bbad", 0x22) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000140)) 14:44:03 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) 14:44:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, 0x0, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:03 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x8, 0x3b, 0x2, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r1, 0x0) 14:44:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff00]}}, 0x1c) geteuid() [ 1847.406096][T12605] FAULT_INJECTION: forcing a failure. [ 1847.406096][T12605] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.444994][T12605] CPU: 0 PID: 12605 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1847.453031][T12605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.463102][T12605] Call Trace: [ 1847.466419][T12605] dump_stack+0x172/0x1f0 [ 1847.470775][T12605] should_fail.cold+0xa/0x15 [ 1847.475392][T12605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1847.481234][T12605] ? ___might_sleep+0x163/0x280 [ 1847.486113][T12605] __should_failslab+0x121/0x190 [ 1847.491056][T12605] should_failslab+0x9/0x14 [ 1847.495564][T12605] kmem_cache_alloc+0x2b2/0x6f0 [ 1847.500422][T12605] ? rcu_read_lock_sched_held+0x110/0x130 [ 1847.500440][T12605] ? kmem_cache_alloc+0x32e/0x6f0 [ 1847.500460][T12605] security_file_alloc+0x39/0x170 [ 1847.500478][T12605] __alloc_file+0xac/0x300 [ 1847.520669][T12605] alloc_empty_file+0x72/0x170 [ 1847.525463][T12605] path_openat+0xef/0x46e0 [ 1847.529903][T12605] ? save_stack+0xa9/0xd0 [ 1847.534266][T12605] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1847.539654][T12605] ? __kmalloc+0x15c/0x740 [ 1847.539669][T12605] ? security_prepare_creds+0x123/0x190 [ 1847.539685][T12605] ? prepare_creds+0x2f5/0x3f0 [ 1847.539700][T12605] ? prepare_exec_creds+0x12/0xf0 [ 1847.539721][T12605] ? __do_execve_file.isra.0+0x393/0x23f0 [ 1847.554414][T12605] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 1847.554431][T12605] ? do_fast_syscall_32+0x281/0xc98 [ 1847.554451][T12605] ? entry_SYSENTER_compat+0x70/0x7f [ 1847.581441][T12605] ? __lock_acquire+0x548/0x3fb0 [ 1847.586386][T12605] ? prepare_exec_creds+0x12/0xf0 [ 1847.586409][T12605] do_filp_open+0x1a1/0x280 [ 1847.586424][T12605] ? may_open_dev+0x100/0x100 [ 1847.586441][T12605] ? fs_reclaim_acquire.part.0+0x30/0x30 14:44:03 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) [ 1847.586455][T12605] ? find_held_lock+0x35/0x130 [ 1847.586478][T12605] ? __lock_acquire+0x548/0x3fb0 [ 1847.586511][T12605] do_open_execat+0x137/0x690 [ 1847.586530][T12605] ? unregister_binfmt+0x170/0x170 [ 1847.586548][T12605] ? lock_downgrade+0x880/0x880 [ 1847.606342][T12605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.606363][T12605] ? kasan_check_read+0x11/0x20 [ 1847.606379][T12605] ? do_raw_spin_unlock+0x57/0x270 [ 1847.606398][T12605] __do_execve_file.isra.0+0x178d/0x23f0 14:44:03 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0x3f, &(0x7f00000001c0)="6b6adacb6b4e1033a49ace3ea5e12a32cd94f24b2b2239f1b857bd4af9c5c23ef07f0d2b55b5c714cc03ad503e5c9beb6902298b7af762327cdeacba6c5d0d141249c556589f9934f9f5e9f9a2413536c52e7d684bbe31d075ca2b9a9464e39b2156720a6ea41cc50aa5e897aecc6e79803f5f9fd17c2b77e569ed0cecc48c7f3a02d891b50098086c59a4603a147ecc172210d43c0ab34a2a", 0x99) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x9, 0xc, 0x1}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) 14:44:03 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4100, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f00000001c0)=""/176) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r2, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) [ 1847.606413][T12605] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1847.606439][T12605] ? copy_strings_kernel+0x110/0x110 [ 1847.606455][T12605] ? strncpy_from_user+0x2a8/0x380 [ 1847.606474][T12605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.637016][T12605] __ia32_compat_sys_execveat+0xf3/0x140 [ 1847.637039][T12605] do_fast_syscall_32+0x281/0xc98 [ 1847.637061][T12605] entry_SYSENTER_compat+0x70/0x7f [ 1847.637072][T12605] RIP: 0023:0xf7fc6869 [ 1847.637087][T12605] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1847.637095][T12605] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1847.637109][T12605] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1847.637116][T12605] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1847.637124][T12605] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1847.637137][T12605] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1847.669321][T12605] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1847.685101][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:03 executing program 0 (fault-call:2 fault-nth:11): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:04 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)) 14:44:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff0f]}}, 0x1c) geteuid() [ 1847.922502][T13211] FAULT_INJECTION: forcing a failure. [ 1847.922502][T13211] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.950516][T13211] CPU: 0 PID: 13211 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1847.958553][T13211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.968619][T13211] Call Trace: [ 1847.971910][T13211] dump_stack+0x172/0x1f0 [ 1847.976245][T13211] should_fail.cold+0xa/0x15 [ 1847.980848][T13211] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1847.986657][T13211] ? ___might_sleep+0x163/0x280 [ 1847.991519][T13211] __should_failslab+0x121/0x190 [ 1847.996450][T13211] should_failslab+0x9/0x14 [ 1848.000969][T13211] __kmalloc_track_caller+0x2d8/0x740 [ 1848.006332][T13211] ? pointer+0xa30/0xa30 [ 1848.010580][T13211] ? kasan_check_read+0x11/0x20 [ 1848.015424][T13211] ? sched_exec+0x1cc/0x260 [ 1848.019916][T13211] ? kasprintf+0xbb/0xf0 [ 1848.024151][T13211] kvasprintf+0xc8/0x170 [ 1848.028407][T13211] ? bust_spinlocks+0xe0/0xe0 [ 1848.033077][T13211] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1848.038869][T13211] ? sched_exec+0x1cc/0x260 [ 1848.043359][T13211] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1848.049175][T13211] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1848.054460][T13211] kasprintf+0xbb/0xf0 [ 1848.058521][T13211] ? kvasprintf_const+0x190/0x190 [ 1848.063557][T13211] ? nr_iowait+0x130/0x130 [ 1848.067963][T13211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.074204][T13211] ? kasan_check_read+0x11/0x20 [ 1848.079061][T13211] __do_execve_file.isra.0+0x94b/0x23f0 [ 1848.084611][T13211] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1848.090853][T13211] ? copy_strings_kernel+0x110/0x110 [ 1848.096128][T13211] ? strncpy_from_user+0x2a8/0x380 [ 1848.101244][T13211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.107480][T13211] __ia32_compat_sys_execveat+0xf3/0x140 [ 1848.113109][T13211] do_fast_syscall_32+0x281/0xc98 [ 1848.118130][T13211] entry_SYSENTER_compat+0x70/0x7f [ 1848.123237][T13211] RIP: 0023:0xf7fc6869 [ 1848.127306][T13211] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1848.146898][T13211] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1848.155301][T13211] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1848.163267][T13211] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 14:44:04 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7fffffff, 0x80) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x100000001, 0x0, 0x1}) dup3(0xffffffffffffffff, r1, 0x0) [ 1848.171230][T13211] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1848.179193][T13211] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1848.187161][T13211] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, 0x0, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:04 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x380, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x9, @rand_addr="c3fc1b58da7be36bdbb3d05d44444b12", 0x1}, r3}}, 0x30) 14:44:04 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)) 14:44:04 executing program 0 (fault-call:2 fault-nth:12): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffb8]}}, 0x1c) geteuid() 14:44:04 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)) [ 1848.430414][T13519] FAULT_INJECTION: forcing a failure. [ 1848.430414][T13519] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1848.444939][T13519] CPU: 0 PID: 13519 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1848.452950][T13519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1848.463017][T13519] Call Trace: [ 1848.466329][T13519] dump_stack+0x172/0x1f0 [ 1848.470676][T13519] should_fail.cold+0xa/0x15 [ 1848.475285][T13519] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1848.481117][T13519] ? ___might_sleep+0x163/0x280 [ 1848.486000][T13519] should_fail_alloc_page+0x50/0x60 [ 1848.491222][T13519] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1848.496608][T13519] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1848.496630][T13519] ? find_held_lock+0x35/0x130 [ 1848.496646][T13519] ? percpu_ref_put_many+0x94/0x190 [ 1848.496660][T13519] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1848.496679][T13519] alloc_pages_current+0x107/0x210 [ 1848.496697][T13519] __get_free_pages+0xc/0x40 [ 1848.496711][T13519] pgd_alloc+0x8b/0x3f0 [ 1848.496726][T13519] ? pgd_page_get_mm+0x40/0x40 [ 1848.496743][T13519] ? lockdep_init_map+0x1be/0x6d0 [ 1848.542502][T13519] ? lockdep_init_map+0x1be/0x6d0 [ 1848.547568][T13519] mm_init+0x590/0x9b0 [ 1848.551674][T13519] mm_alloc+0xa6/0xd0 [ 1848.555680][T13519] __do_execve_file.isra.0+0xaa3/0x23f0 [ 1848.561325][T13519] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1848.567596][T13519] ? copy_strings_kernel+0x110/0x110 [ 1848.572900][T13519] ? strncpy_from_user+0x2a8/0x380 [ 1848.578037][T13519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.584865][T13519] __ia32_compat_sys_execveat+0xf3/0x140 [ 1848.590526][T13519] do_fast_syscall_32+0x281/0xc98 [ 1848.595580][T13519] entry_SYSENTER_compat+0x70/0x7f [ 1848.600708][T13519] RIP: 0023:0xf7fc6869 [ 1848.604789][T13519] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:44:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x20000]}}, 0x1c) geteuid() 14:44:04 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:04 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000040)={0x6, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}]}) ioctl$KVM_SMI(r0, 0xaeb7) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000640)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@gettclass={0x24, 0x2a, 0x100, 0x70bd2c, 0x25dfdbfc, {0x0, r2, {0xd, 0xfffb}, {0x3, 0xe}, {0x9}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) [ 1848.624406][T13519] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1848.632839][T13519] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1848.640827][T13519] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1848.648813][T13519] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1848.656814][T13519] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1848.664863][T13519] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:04 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)) 14:44:04 executing program 0 (fault-call:2 fault-nth:13): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1848.756821][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:04 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, 0x0, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5400]}}, 0x1c) geteuid() 14:44:05 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000100)=0x1) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) [ 1848.892041][T13964] FAULT_INJECTION: forcing a failure. [ 1848.892041][T13964] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1848.926489][T13964] CPU: 1 PID: 13964 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1848.934533][T13964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1848.945611][T13964] Call Trace: [ 1848.948907][T13964] dump_stack+0x172/0x1f0 [ 1848.953249][T13964] should_fail.cold+0xa/0x15 [ 1848.957843][T13964] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1848.963659][T13964] ? ___might_sleep+0x163/0x280 [ 1848.968523][T13964] should_fail_alloc_page+0x50/0x60 [ 1848.973717][T13964] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1848.979115][T13964] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1848.984833][T13964] ? find_held_lock+0x35/0x130 [ 1848.989590][T13964] ? percpu_ref_put_many+0x94/0x190 [ 1848.994787][T13964] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1849.001031][T13964] alloc_pages_current+0x107/0x210 [ 1849.006141][T13964] __get_free_pages+0xc/0x40 [ 1849.010916][T13964] pgd_alloc+0x8b/0x3f0 [ 1849.015069][T13964] ? pgd_page_get_mm+0x40/0x40 [ 1849.019835][T13964] ? lockdep_init_map+0x1be/0x6d0 [ 1849.024852][T13964] ? lockdep_init_map+0x1be/0x6d0 [ 1849.029875][T13964] mm_init+0x590/0x9b0 [ 1849.033941][T13964] mm_alloc+0xa6/0xd0 [ 1849.037929][T13964] __do_execve_file.isra.0+0xaa3/0x23f0 [ 1849.043464][T13964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1849.049797][T13964] ? copy_strings_kernel+0x110/0x110 [ 1849.055073][T13964] ? strncpy_from_user+0x2a8/0x380 [ 1849.060194][T13964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.066436][T13964] __ia32_compat_sys_execveat+0xf3/0x140 [ 1849.072070][T13964] do_fast_syscall_32+0x281/0xc98 [ 1849.077106][T13964] entry_SYSENTER_compat+0x70/0x7f [ 1849.082212][T13964] RIP: 0023:0xf7fc6869 [ 1849.086272][T13964] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1849.105867][T13964] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1849.115900][T13964] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1849.123865][T13964] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1849.131828][T13964] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:44:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x27f60]}}, 0x1c) geteuid() 14:44:05 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r2, r0, 0x80000) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @host}, 0x10) [ 1849.139789][T13964] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1849.147750][T13964] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1849.171083][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5400]}}, 0x1c) geteuid() 14:44:05 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000100)=0x1) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) 14:44:05 executing program 0 (fault-call:2 fault-nth:14): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1849.304881][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1849.371516][T14170] FAULT_INJECTION: forcing a failure. [ 1849.371516][T14170] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1849.395481][T14170] CPU: 1 PID: 14170 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1849.403521][T14170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.403529][T14170] Call Trace: [ 1849.403556][T14170] dump_stack+0x172/0x1f0 [ 1849.403586][T14170] should_fail.cold+0xa/0x15 [ 1849.425855][T14170] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1849.431677][T14170] ? ___might_sleep+0x163/0x280 [ 1849.436563][T14170] should_fail_alloc_page+0x50/0x60 [ 1849.441768][T14170] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1849.447149][T14170] ? native_iret+0x7/0x7 [ 1849.451407][T14170] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1849.457155][T14170] ? touch_atime+0x1b3/0x2a0 [ 1849.457174][T14170] ? touch_atime+0x1b3/0x2a0 [ 1849.457192][T14170] ? find_held_lock+0x35/0x130 [ 1849.457212][T14170] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1849.477442][T14170] alloc_pages_current+0x107/0x210 [ 1849.477464][T14170] get_zeroed_page+0x14/0x50 [ 1849.487137][T14170] __pud_alloc+0x3b/0x250 [ 1849.487157][T14170] __handle_mm_fault+0x7a5/0x3ec0 [ 1849.487184][T14170] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1849.487199][T14170] ? find_held_lock+0x35/0x130 [ 1849.487218][T14170] ? handle_mm_fault+0x322/0xb30 [ 1849.511744][T14170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.517983][T14170] ? kasan_check_read+0x11/0x20 [ 1849.522832][T14170] handle_mm_fault+0x43f/0xb30 [ 1849.527593][T14170] __get_user_pages+0x7b6/0x1a40 [ 1849.532636][T14170] ? follow_page_mask+0x19a0/0x19a0 [ 1849.537827][T14170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.544080][T14170] ? fsnotify+0xbc0/0xbc0 [ 1849.548406][T14170] get_user_pages_remote+0x21d/0x440 [ 1849.553690][T14170] copy_strings.isra.0+0x3dc/0x890 [ 1849.558805][T14170] ? remove_arg_zero+0x590/0x590 [ 1849.563733][T14170] ? prepare_binprm+0x6aa/0x940 [ 1849.568587][T14170] ? lock_downgrade+0x880/0x880 [ 1849.573429][T14170] ? vma_link+0x117/0x180 [ 1849.577750][T14170] ? install_exec_creds+0x180/0x180 [ 1849.582941][T14170] copy_strings_kernel+0xa5/0x110 [ 1849.587957][T14170] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1849.593614][T14170] ? copy_strings_kernel+0x110/0x110 [ 1849.598902][T14170] ? strncpy_from_user+0x2a8/0x380 [ 1849.604008][T14170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.610249][T14170] __ia32_compat_sys_execveat+0xf3/0x140 [ 1849.615894][T14170] do_fast_syscall_32+0x281/0xc98 [ 1849.620920][T14170] entry_SYSENTER_compat+0x70/0x7f [ 1849.626024][T14170] RIP: 0023:0xf7fc6869 [ 1849.630089][T14170] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1849.649681][T14170] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1849.658090][T14170] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:44:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5400]}}, 0x1c) geteuid() 14:44:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x50000]}}, 0x1c) geteuid() 14:44:05 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000100)=0x1) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) 14:44:05 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x80000001, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x310f4d4a}, 0x0, 0x0, &(0x7f0000000140)={0x7fffffff, 0x1, 0x1, 0xa5bd}, &(0x7f00000001c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r0, 0x4) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x20000, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x9, 0x3b, 0x0, r2}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x250000, 0x0) ioctl$KVM_SMI(r3, 0xaeb7) [ 1849.666177][T14170] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1849.674139][T14170] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1849.682102][T14170] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1849.690064][T14170] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1849.730449][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1849.748397][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:06 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r2, r0, 0x80000) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @host}, 0x10) 14:44:06 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000100)=0x1) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) 14:44:06 executing program 0 (fault-call:2 fault-nth:15): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x1000000]}}, 0x1c) geteuid() 14:44:06 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000100)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x20000000084) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x80000000001, 0x31, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0xffffffffffffff49, [], 0x0, 0x0, 0x0}, &(0x7f0000000300)=0x78) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='highspeed\x00', 0xa) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000080)={0x17, 0x2, 0x6}) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r4, 0x0) [ 1850.024292][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:06 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='status\x00') exit(0x0) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/150, 0x96}], 0x1) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000200), 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)=@v2={0x3, 0x2, 0x4, 0x7, 0xed, "bb80bd07c0e3afa954fc1b4f6c2d7960ba4f730ed0ee36a99c036675233ebfa1170d0bdcab6ad862d52ad97bf82e64f0ca8b5e78b4de545a7752c4e534ea37a8727df4598dc85e46e48530cfe43824ad908540ba293cdcb2c34806d23f6bf80ddb87881a9f99f2d231915e25f7ce27aa432f6ab7cec4cbde6ccfcfd35ba8eb054c285d9921d2174a9ec31f646c074ed454cd56418f141c9592951e797ef27e53383e97120190fc32b5677d19d37c30280b7636c1378de618c91f20ca1233bd4d249c660294c9b1a1dbd7789938473ad145c32e8603bf290ef3c174432f47981bf7d9a0a19e30f65c241d348e38"}, 0xf7, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) pipe2(&(0x7f0000000240), 0x4000) dup3(0xffffffffffffffff, r3, 0x0) [ 1850.072499][T14597] FAULT_INJECTION: forcing a failure. [ 1850.072499][T14597] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1850.144386][T14597] CPU: 0 PID: 14597 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1850.152429][T14597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.162499][T14597] Call Trace: [ 1850.165818][T14597] dump_stack+0x172/0x1f0 [ 1850.170176][T14597] should_fail.cold+0xa/0x15 [ 1850.174804][T14597] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1850.180631][T14597] ? ___might_sleep+0x163/0x280 [ 1850.185515][T14597] should_fail_alloc_page+0x50/0x60 14:44:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x2ee0]}}, 0x1c) geteuid() [ 1850.190736][T14597] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1850.196141][T14597] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1850.201966][T14597] ? _raw_spin_unlock_irq+0x28/0x90 [ 1850.207197][T14597] ? kasan_check_read+0x11/0x20 [ 1850.212105][T14597] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1850.218367][T14597] alloc_pages_current+0x107/0x210 [ 1850.223498][T14597] get_zeroed_page+0x14/0x50 [ 1850.228101][T14597] __pud_alloc+0x3b/0x250 [ 1850.232518][T14597] __handle_mm_fault+0x7a5/0x3ec0 [ 1850.237559][T14597] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1850.243130][T14597] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1850.249243][T14597] handle_mm_fault+0x43f/0xb30 [ 1850.254050][T14597] __get_user_pages+0x7b6/0x1a40 [ 1850.259035][T14597] ? follow_page_mask+0x19a0/0x19a0 [ 1850.264264][T14597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.270545][T14597] ? fsnotify+0xbc0/0xbc0 [ 1850.274894][T14597] get_user_pages_remote+0x21d/0x440 [ 1850.280209][T14597] copy_strings.isra.0+0x3dc/0x890 [ 1850.285348][T14597] ? remove_arg_zero+0x590/0x590 [ 1850.290303][T14597] ? prepare_binprm+0x6aa/0x940 14:44:06 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x8, 0x4, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) [ 1850.295172][T14597] ? lock_downgrade+0x880/0x880 [ 1850.300041][T14597] ? vma_link+0x117/0x180 [ 1850.304384][T14597] ? install_exec_creds+0x180/0x180 [ 1850.309597][T14597] copy_strings_kernel+0xa5/0x110 [ 1850.314639][T14597] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1850.320300][T14597] ? copy_strings_kernel+0x110/0x110 [ 1850.325591][T14597] ? strncpy_from_user+0x2a8/0x380 [ 1850.325613][T14597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.325635][T14597] __ia32_compat_sys_execveat+0xf3/0x140 [ 1850.325658][T14597] do_fast_syscall_32+0x281/0xc98 [ 1850.325678][T14597] entry_SYSENTER_compat+0x70/0x7f [ 1850.325695][T14597] RIP: 0023:0xf7fc6869 [ 1850.337039][T14597] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1850.337048][T14597] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1850.337061][T14597] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:44:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x2000000]}}, 0x1c) geteuid() 14:44:06 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x10000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xaeef, 0x32, 0x0, r0}) dup3(0xffffffffffffffff, r1, 0x0) 14:44:06 executing program 0 (fault-call:2 fault-nth:16): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1850.337070][T14597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1850.337078][T14597] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1850.337086][T14597] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1850.337094][T14597] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1850.434252][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:06 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000100)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x20000000084) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x80000000001, 0x31, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0xffffffffffffff49, [], 0x0, 0x0, 0x0}, &(0x7f0000000300)=0x78) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x10000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='highspeed\x00', 0xa) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000080)={0x17, 0x2, 0x6}) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r4, 0x0) 14:44:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e23, @empty}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x40, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'bridge_slave_1\x00'}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000000100)={0x253, 0x31364d59, 0x3, 0x100000001, 0x1, @discrete={0x100, 0xae9}}) dup3(0xffffffffffffffff, r2, 0x0) 14:44:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x3000000]}}, 0x1c) geteuid() [ 1850.548989][T15225] FAULT_INJECTION: forcing a failure. [ 1850.548989][T15225] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:44:06 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='status\x00') exit(0x0) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000100)=""/150, 0x96}], 0x1) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000200), 0x4) fsetxattr$security_evm(r1, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000080)=@v2={0x3, 0x2, 0x4, 0x7, 0xed, "bb80bd07c0e3afa954fc1b4f6c2d7960ba4f730ed0ee36a99c036675233ebfa1170d0bdcab6ad862d52ad97bf82e64f0ca8b5e78b4de545a7752c4e534ea37a8727df4598dc85e46e48530cfe43824ad908540ba293cdcb2c34806d23f6bf80ddb87881a9f99f2d231915e25f7ce27aa432f6ab7cec4cbde6ccfcfd35ba8eb054c285d9921d2174a9ec31f646c074ed454cd56418f141c9592951e797ef27e53383e97120190fc32b5677d19d37c30280b7636c1378de618c91f20ca1233bd4d249c660294c9b1a1dbd7789938473ad145c32e8603bf290ef3c174432f47981bf7d9a0a19e30f65c241d348e38"}, 0xf7, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) pipe2(&(0x7f0000000240), 0x4000) dup3(0xffffffffffffffff, r3, 0x0) [ 1850.628256][T15225] CPU: 0 PID: 15225 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1850.636292][T15225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.646358][T15225] Call Trace: [ 1850.649671][T15225] dump_stack+0x172/0x1f0 [ 1850.654030][T15225] should_fail.cold+0xa/0x15 [ 1850.658650][T15225] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1850.664471][T15225] ? ___might_sleep+0x163/0x280 [ 1850.669352][T15225] should_fail_alloc_page+0x50/0x60 [ 1850.674571][T15225] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1850.679965][T15225] ? __pud_alloc+0x1d3/0x250 [ 1850.684582][T15225] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1850.690321][T15225] ? __pud_alloc+0x1d3/0x250 [ 1850.694951][T15225] ? lock_downgrade+0x880/0x880 [ 1850.699822][T15225] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1850.706096][T15225] alloc_pages_current+0x107/0x210 [ 1850.707694][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1850.711221][T15225] __pmd_alloc+0x41/0x460 [ 1850.726566][T15225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1850.732828][T15225] __handle_mm_fault+0x192a/0x3ec0 [ 1850.737981][T15225] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1850.743544][T15225] ? find_held_lock+0x35/0x130 [ 1850.748333][T15225] ? handle_mm_fault+0x322/0xb30 [ 1850.753379][T15225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.759636][T15225] ? kasan_check_read+0x11/0x20 [ 1850.764508][T15225] handle_mm_fault+0x43f/0xb30 [ 1850.769293][T15225] __get_user_pages+0x7b6/0x1a40 [ 1850.774264][T15225] ? follow_page_mask+0x19a0/0x19a0 [ 1850.779478][T15225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.785749][T15225] ? fsnotify+0xbc0/0xbc0 [ 1850.790099][T15225] get_user_pages_remote+0x21d/0x440 [ 1850.795413][T15225] copy_strings.isra.0+0x3dc/0x890 [ 1850.800547][T15225] ? remove_arg_zero+0x590/0x590 [ 1850.805499][T15225] ? prepare_binprm+0x6aa/0x940 [ 1850.810360][T15225] ? lock_downgrade+0x880/0x880 [ 1850.815215][T15225] ? vma_link+0x117/0x180 [ 1850.819553][T15225] ? install_exec_creds+0x180/0x180 14:44:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4000000]}}, 0x1c) geteuid() 14:44:06 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(0xffffffffffffffff, r1, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) [ 1850.824862][T15225] copy_strings_kernel+0xa5/0x110 [ 1850.829908][T15225] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1850.835573][T15225] ? copy_strings_kernel+0x110/0x110 [ 1850.840872][T15225] ? strncpy_from_user+0x2a8/0x380 [ 1850.846012][T15225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.852270][T15225] __ia32_compat_sys_execveat+0xf3/0x140 [ 1850.852296][T15225] do_fast_syscall_32+0x281/0xc98 [ 1850.862953][T15225] entry_SYSENTER_compat+0x70/0x7f [ 1850.868075][T15225] RIP: 0023:0xf7fc6869 [ 1850.872148][T15225] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1850.891768][T15225] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1850.900194][T15225] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1850.908175][T15225] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1850.916167][T15225] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:44:07 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x8, 0x4, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) [ 1850.924158][T15225] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1850.932148][T15225] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:07 executing program 2 (fault-call:3 fault-nth:0): r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:07 executing program 0 (fault-call:2 fault-nth:17): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5000000]}}, 0x1c) geteuid() [ 1851.100360][T15668] FAULT_INJECTION: forcing a failure. [ 1851.100360][T15668] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.119342][T15668] CPU: 0 PID: 15668 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1851.127361][T15668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.127366][T15668] Call Trace: [ 1851.127391][T15668] dump_stack+0x172/0x1f0 [ 1851.127412][T15668] should_fail.cold+0xa/0x15 [ 1851.127431][T15668] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1851.127451][T15668] ? ___might_sleep+0x163/0x280 [ 1851.127471][T15668] __should_failslab+0x121/0x190 [ 1851.127486][T15668] should_failslab+0x9/0x14 [ 1851.127501][T15668] kmem_cache_alloc+0x2b2/0x6f0 [ 1851.127520][T15668] ? alloc_pages_current+0x10f/0x210 [ 1851.165375][T15668] __pmd_alloc+0xc9/0x460 [ 1851.165393][T15668] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1851.165410][T15668] __handle_mm_fault+0x192a/0x3ec0 [ 1851.165431][T15668] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1851.165446][T15668] ? find_held_lock+0x35/0x130 [ 1851.165461][T15668] ? handle_mm_fault+0x322/0xb30 [ 1851.165484][T15668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.165505][T15668] ? kasan_check_read+0x11/0x20 [ 1851.165526][T15668] handle_mm_fault+0x43f/0xb30 [ 1851.206111][T15668] __get_user_pages+0x7b6/0x1a40 [ 1851.206138][T15668] ? follow_page_mask+0x19a0/0x19a0 [ 1851.206155][T15668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.206179][T15668] ? fsnotify+0xbc0/0xbc0 14:44:07 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:07 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x10000000000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(0xffffffffffffffff, r1, 0x0) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.redirect\x00') ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000080)={0x0, 0x107, "5914cc901f523e06a655089b08a94f6a4cf249b292f025b1005a931011e534fc", 0x1ff, 0x101, 0x5, 0x2ee, 0x48}) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000100)=0x2) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) [ 1851.206197][T15668] get_user_pages_remote+0x21d/0x440 [ 1851.206222][T15668] copy_strings.isra.0+0x3dc/0x890 [ 1851.217382][T15668] ? remove_arg_zero+0x590/0x590 [ 1851.217398][T15668] ? prepare_binprm+0x6aa/0x940 [ 1851.217411][T15668] ? lock_downgrade+0x880/0x880 [ 1851.217423][T15668] ? vma_link+0x117/0x180 [ 1851.217438][T15668] ? install_exec_creds+0x180/0x180 [ 1851.217456][T15668] copy_strings_kernel+0xa5/0x110 [ 1851.217474][T15668] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1851.217499][T15668] ? copy_strings_kernel+0x110/0x110 [ 1851.217514][T15668] ? strncpy_from_user+0x2a8/0x380 [ 1851.217533][T15668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.217553][T15668] __ia32_compat_sys_execveat+0xf3/0x140 [ 1851.315239][T15668] do_fast_syscall_32+0x281/0xc98 [ 1851.320282][T15668] entry_SYSENTER_compat+0x70/0x7f [ 1851.325404][T15668] RIP: 0023:0xf7fc6869 [ 1851.329494][T15668] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1851.349111][T15668] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1851.357546][T15668] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1851.365536][T15668] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1851.373526][T15668] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1851.381512][T15668] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1851.389497][T15668] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:07 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x2, &(0x7f00000000c0)=0x2) 14:44:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x6000000]}}, 0x1c) geteuid() 14:44:07 executing program 5 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:07 executing program 0 (fault-call:2 fault-nth:18): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:07 executing program 3: r0 = fanotify_init(0x7, 0x2) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffff9c) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@ipv6_getroute={0x38, 0x1a, 0xa04, 0x70bd27, 0x25dfdbfc, {0xa, 0x14, 0x14, 0x10001, 0xff, 0x7, 0xff, 0xf, 0x100}, [@RTA_PRIORITY={0x8, 0x6, 0x86}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000800}, 0x4) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='personality\x00') ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000080)=""/219) r4 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={r4, 0x4, 0x10001}, &(0x7f00000002c0)={'enc=', 'pkcs1', ' hash=', {'rmd128-generic\x00'}}, &(0x7f0000000340)="0d966164237626be0a85c4c07e2a05687f9e2330742ee1c20eedd2209f2aff8c3465d6fbc0d3bce4f8bf7daaa7281cd1e4593f2ab23a0c3b04bae6aa705ed1bb12ae17eeed5a7ab6e099bed3b80a4d7a0078111da16a69a86b43b379356174f44a05d4", &(0x7f00000003c0)=""/121) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f00000001c0)=0x2) dup3(0xffffffffffffffff, r5, 0x0) 14:44:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, 0x0, 0x0) [ 1851.551415][T15985] FAULT_INJECTION: forcing a failure. [ 1851.551415][T15985] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.573273][ C1] net_ratelimit: 2 callbacks suppressed [ 1851.573284][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1851.601241][T16012] FAULT_INJECTION: forcing a failure. [ 1851.601241][T16012] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.616525][T16012] CPU: 0 PID: 16012 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #92 [ 1851.624559][T16012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.634643][T16012] Call Trace: [ 1851.637974][T16012] dump_stack+0x172/0x1f0 [ 1851.642341][T16012] should_fail.cold+0xa/0x15 [ 1851.646973][T16012] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1851.652820][T16012] ? ___might_sleep+0x163/0x280 [ 1851.657720][T16012] __should_failslab+0x121/0x190 [ 1851.662682][T16012] should_failslab+0x9/0x14 [ 1851.667210][T16012] kmem_cache_alloc+0x2b2/0x6f0 [ 1851.672092][T16012] ? lock_downgrade+0x880/0x880 [ 1851.676983][T16012] getname_flags+0xd6/0x5b0 [ 1851.681512][T16012] user_path_at_empty+0x2f/0x50 [ 1851.686386][T16012] do_mount+0x150/0x2c40 [ 1851.686416][T16012] ? copy_mount_string+0x40/0x40 [ 1851.686434][T16012] ? fput+0x1b/0x20 [ 1851.686452][T16012] ? ksys_write+0x1f1/0x2d0 [ 1851.686474][T16012] ? copy_mount_options+0x280/0x3a0 [ 1851.686504][T16012] __ia32_compat_sys_mount+0x664/0x790 [ 1851.686527][T16012] ? trace_hardirqs_on+0x67/0x230 [ 1851.695699][T16012] do_fast_syscall_32+0x281/0xc98 [ 1851.695727][T16012] entry_SYSENTER_compat+0x70/0x7f [ 1851.695741][T16012] RIP: 0023:0xf7f3f869 14:44:07 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x541b, &(0x7f00000000c0)=0x2) [ 1851.695757][T16012] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1851.695767][T16012] RSP: 002b:00000000f5d3b0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000015 [ 1851.695784][T16012] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000020000080 [ 1851.695794][T16012] RDX: 0000000000000000 RSI: 0000000000020000 RDI: 0000000000000000 [ 1851.695809][T16012] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1851.786090][T16012] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1851.794077][T16012] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1851.816319][T15985] CPU: 1 PID: 15985 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #92 [ 1851.824361][T15985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.834443][T15985] Call Trace: [ 1851.837754][T15985] dump_stack+0x172/0x1f0 [ 1851.842110][T15985] should_fail.cold+0xa/0x15 [ 1851.846730][T15985] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1851.852565][T15985] ? ___might_sleep+0x163/0x280 [ 1851.857437][T15985] __should_failslab+0x121/0x190 [ 1851.862387][T15985] should_failslab+0x9/0x14 [ 1851.866907][T15985] kmem_cache_alloc+0x2b2/0x6f0 [ 1851.871779][T15985] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1851.878063][T15985] ptlock_alloc+0x20/0x70 [ 1851.878081][T15985] pte_alloc_one+0x6d/0x1a0 [ 1851.878097][T15985] __pte_alloc+0x20/0x310 [ 1851.878117][T15985] __handle_mm_fault+0x3391/0x3ec0 [ 1851.886937][T15985] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1851.886954][T15985] ? find_held_lock+0x35/0x130 [ 1851.886972][T15985] ? handle_mm_fault+0x322/0xb30 [ 1851.886995][T15985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.887015][T15985] ? kasan_check_read+0x11/0x20 [ 1851.887036][T15985] handle_mm_fault+0x43f/0xb30 [ 1851.887061][T15985] __get_user_pages+0x7b6/0x1a40 [ 1851.932514][T15985] ? follow_page_mask+0x19a0/0x19a0 [ 1851.937742][T15985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.944019][T15985] ? fsnotify+0xbc0/0xbc0 [ 1851.948370][T15985] get_user_pages_remote+0x21d/0x440 [ 1851.953691][T15985] copy_strings.isra.0+0x3dc/0x890 [ 1851.958845][T15985] ? remove_arg_zero+0x590/0x590 [ 1851.963805][T15985] ? prepare_binprm+0x6aa/0x940 [ 1851.968670][T15985] ? lock_downgrade+0x880/0x880 [ 1851.973529][T15985] ? vma_link+0x117/0x180 [ 1851.977978][T15985] ? install_exec_creds+0x180/0x180 [ 1851.983203][T15985] copy_strings_kernel+0xa5/0x110 [ 1851.988251][T15985] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1851.993912][T15985] ? copy_strings_kernel+0x110/0x110 [ 1851.999208][T15985] ? strncpy_from_user+0x2a8/0x380 [ 1852.004358][T15985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.010626][T15985] __ia32_compat_sys_execveat+0xf3/0x140 [ 1852.016276][T15985] do_fast_syscall_32+0x281/0xc98 [ 1852.016305][T15985] entry_SYSENTER_compat+0x70/0x7f [ 1852.026412][T15985] RIP: 0023:0xf7fc6869 [ 1852.026426][T15985] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1852.026433][T15985] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1852.026448][T15985] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:44:08 executing program 3: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x100000000000005, 0x12, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r1, 0x0) 14:44:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x60e8d83]}}, 0x1c) geteuid() 14:44:08 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8969f29cd5e4e1f5, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r2, 0x4) 14:44:08 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5421, &(0x7f00000000c0)=0x2) 14:44:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x7000000]}}, 0x1c) geteuid() [ 1852.026457][T15985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1852.026465][T15985] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1852.026478][T15985] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1852.090518][T15985] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20002, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:08 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r0, 0x10000000080000) [ 1852.210151][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:08 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:08 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5450, &(0x7f00000000c0)=0x2) 14:44:08 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x8000000]}}, 0x1c) geteuid() 14:44:08 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000000)) 14:44:08 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x300) [ 1852.457860][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200f0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:08 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5452, &(0x7f00000000c0)=0x2) 14:44:08 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x500) 14:44:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x9000000]}}, 0x1c) geteuid() 14:44:08 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0xfffffffffffffffd, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r1, 0x0) 14:44:08 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5460, &(0x7f00000000c0)=0x2) [ 1852.765790][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:08 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x21020, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:09 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x600) 14:44:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:09 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xa000000]}}, 0x1c) geteuid() 14:44:09 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40049409, &(0x7f00000000c0)=0x2) 14:44:09 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x700) 14:44:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x22000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 1853.112366][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:09 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:09 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x900) 14:44:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe000000]}}, 0x1c) geteuid() 14:44:09 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x2000) [ 1853.266662][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:09 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x4020940d, &(0x7f00000000c0)=0x2) 14:44:09 executing program 4 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:09 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xa00) 14:44:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x10000000]}}, 0x1c) geteuid() 14:44:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x22010, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:09 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:09 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xb00) 14:44:09 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x4000) 14:44:09 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x402c5828, &(0x7f00000000c0)=0x2) [ 1853.608051][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:09 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xc00) 14:44:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2f000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x14000000]}}, 0x1c) geteuid() 14:44:10 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x200000) [ 1853.850848][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:10 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x402c582a, &(0x7f00000000c0)=0x2) 14:44:10 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xd00) 14:44:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x80000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x18020000]}}, 0x1c) geteuid() 14:44:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:10 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x400000) 14:44:10 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xe00) [ 1854.102508][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:10 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0xc0189436, &(0x7f00000000c0)=0x2) 14:44:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x20000000]}}, 0x1c) geteuid() 14:44:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:10 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1002) 14:44:10 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80ffff) 14:44:10 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0xc020660b, &(0x7f00000000c0)=0x2) [ 1854.394024][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:10 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x8040) bind$isdn(r1, &(0x7f0000000040)={0x22, 0x4, 0x4, 0x8, 0xb3}, 0x6) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc0ed0000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:10 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1003) 14:44:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x40000000]}}, 0x1c) geteuid() 14:44:10 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0xffff8000) 14:44:10 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000000000000fdffffffffffffff01000000010000800600000000000000060000000000000000000000000000000200000000000000000000000000000000000000000000000400000000000000000000000000000001040000000000000400000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffff0000000000000300000000000000000000000000000000000000000000000e05000000000000000000000000000008000000000000000200000000000000060000000000000000000000000000000000000000000000800400000000000000000000000000000000000000000000040000000000000008000000000000000000000000000000000000000000000000010000000000000000000000000000080000000000000054fea343000000000080000000000000000000000000000000000000000000000200"/368]) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:10 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1004) 14:44:11 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x20000000000000) 14:44:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x40020000]}}, 0x1c) geteuid() 14:44:11 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', r1}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8001, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='iso9660\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) socket$inet(0x2, 0x8000f, 0xffffffffffffff01) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:11 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1005) [ 1855.067179][T21673] e Filesystem requires source device 14:44:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x54000000]}}, 0x1c) geteuid() 14:44:11 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x40000000000000) 14:44:11 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1006) 14:44:11 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) modify_ldt$write(0x1, &(0x7f0000000080)={0x3, 0x20000800, 0x1000, 0xa1ed, 0x8, 0x3, 0xfff, 0x8, 0x8, 0x1}, 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:11 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$TIOCCONS(r0, 0x541d) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x607f0200]}}, 0x1c) geteuid() 14:44:11 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80ffff00000000) 14:44:11 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1007) 14:44:11 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x900, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)={0xa}) delete_module(&(0x7f0000000140)='%selinux*securityselinux\x00', 0x200) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000200)='\x00', 0xfffffffffffffffa) r1 = openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x20040, 0x2) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc044565d, &(0x7f0000000400)={0x1000, 0xf, 0x4, 0x80000, {0x77359400}, {0x3, 0x2, 0x10000, 0x20, 0x4, 0x80000001, "fe4a928b"}, 0x5, 0x3, @planes=&(0x7f00000003c0)={0x6, 0x4, @userptr=0x8, 0x4fe7a13a}, 0x4}) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)='nodevvboxnet0}-systemppp1\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x84) r2 = socket$rds(0x15, 0x5, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc004240a, &(0x7f0000000540)=ANY=[@ANYBLOB="02000000000000000000000000afd4a84e55b5cdda42594d8e803ce3d3553015dbe672be6fe2217c1472db0c708b949eb1f9ea7333182d073b060b8dd2679b9f8d"]) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000440)="6fcc9239df6f34fc75c0b08992424772265019e748", 0x15) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000480)={0xfffffffffffffff8, 0xfffffffffffffffc, 0x3d4e40b6}) getdents(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_selinux(r2, &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:devicekit_power_exec_t:s0\x00', 0x2c, 0x1) 14:44:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x648e4566]}}, 0x1c) geteuid() 14:44:11 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1009) 14:44:11 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r2, 0x0) 14:44:11 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r1 = open(&(0x7f0000000000)='./file0\x00', 0x220080, 0x1d3) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000040)=0x6) 14:44:11 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101000, 0x0) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f00000001c0)) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000280)={0x401, {{0x2, 0x4e20, @broadcast}}}, 0x84) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:12 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x100a) 14:44:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x66458e64]}}, 0x1c) geteuid() 14:44:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:12 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x201, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, r1}) r3 = dup3(r0, r2, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xd, 0x1010, r0, 0x0) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f0000000000)=0x80000000) 14:44:12 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x4800, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f00000001c0)={0x1, 0x8000, 0x9, 'queue1\x00', 0x200}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:12 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1018) 14:44:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x838d0e06]}}, 0x1c) geteuid() 14:44:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:12 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x88000, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x2000, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 14:44:12 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200080) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000100)={0x1, "f2"}, 0x2) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:12 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000100)) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0xfffffffffffffffc, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000000c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000640), r3}}, 0x18) 14:44:12 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1027) 14:44:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x8dffffff]}}, 0x1c) geteuid() 14:44:12 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x200000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x800, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:12 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x102f) 14:44:12 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x80000) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f00000000c0)=0x1, &(0x7f0000000100)=0xfffffffffffffd9c) ioctl$FS_IOC_RESVSP(r2, 0x402c5828, &(0x7f0000000000)={0x0, 0x6, 0x81, 0x2}) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/82}) 14:44:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x800) write$P9_RREMOVE(r0, &(0x7f00000000c0)={0x7, 0x7b, 0x2}, 0x7) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x100) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @raw_data=[0x8, 0x40, 0x2, 0x7, 0x0, 0x4, 0x2, 0x5, 0x6, 0x2, 0x1, 0x3, 0x4, 0xeef, 0x688c, 0x3ff, 0x10000, 0x5, 0x1, 0x401, 0x2, 0x1000, 0x4, 0x80000000, 0x53, 0x8, 0xfffffffffffffffd, 0x4, 0xfff, 0x4, 0x2, 0x7fffffff]}) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r0, 0x304, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x1, 0x2, 0xfffffffffffffbff}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x1) 14:44:12 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1048) 14:44:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x91ffffff]}}, 0x1c) geteuid() 14:44:12 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x408000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:12 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc202, 0x80000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) 14:44:12 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x20000, 0x0) chmod(0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x2, 0x4000) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=0x0, &(0x7f0000000440)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000480)={r2, 0x1ff}, 0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) syslog(0xb, &(0x7f00000001c0)=""/152, 0x98) r4 = syz_open_dev$sndpcmc(&(0x7f0000000300)='/dev/snd/pcmC#D#c\x00', 0x9, 0x440000) renameat2(r4, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000380)='./file0\x00', 0x7) getdents(0xffffffffffffffff, 0x0, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 14:44:12 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x104c) 14:44:13 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xfffffffffffffff8, 0x2000) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'ip6_vti0\x00', 0x400}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xb8ff0000]}}, 0x1c) geteuid() 14:44:13 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1068) 14:44:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10000, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000080)=""/14, &(0x7f00000000c0)=0xe) 14:44:13 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x410280, 0x0) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000080)=""/111) dup3(r0, r1, 0x0) [ 1857.097296][ C1] net_ratelimit: 4 callbacks suppressed [ 1857.097306][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:13 executing program 5: r0 = dup(0xffffffffffffff9c) getsockopt$inet6_buf(r0, 0x29, 0xfe, &(0x7f0000000200)=""/206, &(0x7f0000000040)=0xce) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x40002000}) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:13 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x106c) 14:44:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc4ffffff]}}, 0x1c) geteuid() 14:44:13 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) clock_gettime(0x7, &(0x7f0000000080)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:13 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0xaeef, 0x28, 0x0, 0xffffffffffffff9c}) r2 = socket$caif_stream(0x25, 0x1, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8) r3 = dup3(r0, r1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x4e24, @local}}) 14:44:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) time(&(0x7f0000000040)) 14:44:13 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1074) 14:44:13 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xdc7f0000]}}, 0x1c) geteuid() 14:44:13 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x10000, 0x0) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x8, 0x100) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000180)={0x82, 0x21, 0x1, r2}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x88, @ipv4={[], [], @empty}, 0x7}, {0xa, 0x4e20, 0x3, @mcast2, 0x5}, r3, 0xffff}}, 0x48) 14:44:13 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:13 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x107a) 14:44:13 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 1857.682150][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:13 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x101000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x222100, 0x0) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000180)="96d221cc7af02ab8cf955e61e7b21e95447ea568071952a24e833a86") dup3(r0, r1, 0x0) 14:44:13 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe02e0000]}}, 0x1c) geteuid() 14:44:13 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1200) [ 1857.912183][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:14 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x9fffd, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:14 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) msgctl$IPC_RMID(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x800000000000) 14:44:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000640)=""/170, 0xaa}, {&(0x7f0000000480)=""/126, 0x7e}], 0x2, &(0x7f0000000700)=""/166, 0xa6}, 0x20) getsockname$netlink(r0, &(0x7f00000007c0), &(0x7f0000000800)=0xc) r1 = syz_genetlink_get_family_id$tipc(0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000002}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x621, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x8011) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000fedbdf1d01000000000000000c412000000c001473797a3100000000"], 0x28}}, 0x1) timer_settime(r3, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe8030000]}}, 0x1c) geteuid() 14:44:14 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2000) 14:44:14 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2, 0x0) ioctl$BLKBSZSET(r0, 0x40041271, &(0x7f0000000140)=0x3) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8002, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1ff, 0x101000) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f00000000c0)={0x8633e6948e6b8e69, 0xfffffffffffffffe, 0x0, 0x84000, r4}) dup3(r1, r2, 0x0) [ 1858.132847][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:14 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x2f00) 14:44:14 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000100)=0x7, 0x4) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xeffdffff]}}, 0x1c) geteuid() 14:44:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x6) chmod(&(0x7f00000000c0)='./file0\x00', 0x41) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:14 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x4000) 14:44:14 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000100)={0x36, 0x1f, 0x10, 0x19, 0xb, 0x101, 0x2, 0x106, 0xffffffffffffffff}) r3 = dup3(r0, r1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) recvfrom(r3, &(0x7f00000001c0)=""/85, 0x55, 0x40010060, 0x0, 0x0) 14:44:14 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000100)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:14 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0xff00) 14:44:14 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x34, 0x3e6, 0xffffffffffffffff, 0x0, 0x100, 0x0, 0x0, 0x100000000, 0x0, 0xccd, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3375}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x801, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x5, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xf4010000]}}, 0x1c) geteuid() 14:44:14 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x40000) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000200)=""/240, 0xf0}, &(0x7f00000000c0), 0x9}, 0x20) getdents(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'U-', 0x5}, 0x28, 0x3) 14:44:14 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffff800, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000080)=0x100) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x24, 0x0, r0}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 14:44:14 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) socket$xdp(0x2c, 0x3, 0x0) 14:44:14 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x2aeee, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) [ 1858.703867][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xf5ffffff]}}, 0x1c) geteuid() 14:44:15 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x200000, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x100) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f00000011c0)={0x2, 0x8a6, &(0x7f0000000080)="66a5410de025ce3f13a247ab9d6ec10e624d16d6ad2ea914e075008ccba4320ca8285f83727c3ed29d61b6070a44883946b34f5f0daa3026f93688c5809dd3691a1870d2905cd155dbd1936eb32cefe2b0e0268584cfb9cf1867ee3723f5f09ec7e6105321b3c3bfe00cf3c2be8c08f2b4d31b3318112b1f869e5395104d138272769ca7963f19195112fa09288b2237d084f9ff6b7404bf54425282d72004fef6754fcaeb7ffc2e3f5ab5dc98ddc92f15aee0ef6423bafbc8a0e0bd56193252ee67", &(0x7f00000001c0)="081772ae3e05a1316127bc79db388e7fecc4efda8b41843d242c844ab0494857f0f1db9268a40fc35ecd28526199acb8466e3fae58c036c86373855fc4d690fb1f2c8b07e41c2b8c4665df94162e405ea47fb2cb769280de4c6bd6a3d2641d67d58ce89740f175b3b027afb79f3f6c756d30025c67429aca5c50be8d0127f7e229bb940de0ed7825897d7eed5bb7391f52b7051076d5cc77f749c7b0aaa3c917c772fb05a55bdec6915df3280e905987046ea659ef818733e120733c6f61479fc2e5c967881ac18e8107afee3b29cff217f42fa390ac2d61460810a12615202433c811c366b86830be8daf7626ddfda85e3fec8b2ff7756a88f63231b3689034d08cc30adf0bc548c03907a111c3cab118093be67210cd72d321d159dac2c0ec8b2e34fd65c1d69ff6019e81e4a2d046ab96003aaeb29773f104b14063e88ecd71782a16629d8de5325f3c74f1af21eb68c47e70a9c15e3c8c630e34efe3bdc926b5f4306b24f5e454238ffa7240153825d8d98c12ea70c4475b6efdd4c1c4d6a9454d9c14ce62b3a7dd4d3ce81a9f28620fda5156487f943e4ce4232f69985fed92caa85822723a3906ab14c78151f7c1db527005322782f89e051c889203d5c6d70b0710f68ccbbb1a67278bce6ff2cfe8deffef4e9a5e62eb22c85f0db92bc36dd00037ff605a5028b9f0c7ab9aefde03e079b19ddc5d205d55968779ffb06c1d20f87ef2b502737bab054ce680a160ef13615e751b135b42ab7e3db95a0acb325b4de17b3959940bf25652d92d35f04a83764fe799f7a3f4f714d0af8e4f42d9d55aef8a4b743d20196020534cb2876c40cbf71ff4a617854da486767e2a02da73bc764bf2bf6449dcea6c7e63aa8e16907f71f0611910d86e3f43ba97062a006b423121aece9270aecf9681790a44e8f4a55c4b97c5262c3c11127815be55ee17bf6e81d5c6f91de0fa526fc73cde9f5e413bd900bfa610aa7d79e4e92784aa7292627be5d7aaa755a55cf4077005c834734aaac1e91c7aa7684e83b198ad64f6bfec687424dce0d87d7f982c0ce3c97d47d5037758a317d9649491c36161d90886d590636dbb14866426e001031f12760f7a05269723e7b81a679486428729569b7b1f039d1a0b30e6a70dab72fffbd5ecf90edc7f61a4ad186b73fe60fd020de92eb7175784536b1ef1ce58ec8e2e65055165f5d36b6f52ccc8b0871c3e4a7720d7bc67b4df1f265f68512796333dc1e6cd44bdc6e036a2b6ac2c6aeed9c213f541488f581baf5953e21300429c2a3a1af4c995a0d243b111b7254eeb836fff5643ea30c92463a02ec033637d83d45fc081ccbe62290851d0de1038edf2d2cfc96530bd54e3350a1cbd8e1d0eff5d37857dd2402d3318a52a6621cab1b652654841ac5e68c669b68f82edac13a888b64c086cfcb270c00407e618f8199eae71d669483db05e4e2ca0e6e589843cb44a0eb8fc135c0bc0310ef62ab5c7da2a1a860507d1e2b28a0e44e9d786562b662946e9157e66883cd48ff460396fdfcffb0ceb5a682da81b9575c30663dc63de7bbf870b1538b5dae9f397f17fc40aae27e3f80767694e17759fb34952e80c51acd595f3cfc3f78b9d6418c35bf3c88f8ba361069d51d1d38cf590da615b395d3862dcda3f334d13c32a037063431c72842aa43f3ed2c1eca4d16404d7d558c43bf7753890484f720827a43e5d6658f790d50b748b23ab06f3be4e41bac603825141bac749ce2c51754ed65494470f6b9f69a72ca0d29ee1e83cabe02b0f99aaf8c293d8728594027bc80897ab0101bf4824cedd32f6d051bb5677ae54d6b9fdefacaf6907e4c108cba585cf0c0d2eaf46ac899ed4bd0361668e02fe9bbb900f9d6531c7f0ee5c5af25cc79a6f34bb212516ae5d395a4760ba5428216c1c385d17d11062b20b45817f2a068667c5b66c64514feb78d04d3b3f10d398f49ed780bea2e81e9e8b500731dd343a8cda1163ec27f59990eacf28724471c3355bee9e7b85b13e86fff67febf8688e3b5f5d4647671af431c487b831b5f85b5df1728177d58f9a13aa4213b86c82ec201520cfe412b3dded706775d17178ccd591a419dd5e19c93a6c594ebda0eab92f9489177892894a1f647e86a55762d79631714a8594333ccc73164ff39f61f9cbaf7e99003cacc3a297e935313bfc6c152ed6607fc9f08c3f5cff22219966b09c47a888c755dc6cbeea1acc258834a2de0c6a6634c47ec9cc07d5a98bccafcdaf510ef557df11902fb65812ea754973ae18bd716d2d82ab10aa1a4b68a16c213a0bcba933801a4d13115a7222650f8f0ba479007a1d4d624784907f49353b8960cfc8f107c4a9ba0051155e4b1bb4bb90b7403baad63d73ff1827a4b866a5aa32142beaab66df1a6c2e1a8cf4aefecb6b9f3dd906ce722f2ce79f70abc8a6771f67a0996470dcf70362c1b8b26cb5d5d42d67cca5790583a1e4fc05dae934d4bf9e202fbc3f64b61a0c3fe6434d7a4c1468f1c27a546dc87d6c7741b0a8c8c51ab3a3f57429d3710f8d5fba2157a339cf2373ba9076743d0cf109f15cd57a5ad26d2567358b3e7cb0eb62f2e070da2177a0cafac9811c263bea3c8f1afbddc9e9ee770acfdbf01f9c6ae8bde536addadc49fb06b8ebb88415c3b9d3dbf20df475afd705963b0bb4a2e0fbd5a1df4fc1f7f408ba56e2ea2132d41a2517a7351c9d3a53c0ad04bb21204be6f70d4b34d644f0de6656398b99a85cab08ba12b624ef4cd86551583477ce4679e1f8e18711c76a7142bbbbc89226b1af9ab6fb356690210ba12a55b9ebff7a22de817f619b15f6e85e3c4d8e7b825369f396e7a742afe69053f49a12956e710c6e494cad692fae3d9bb46e7eebb5118b2bdfabdcb5ab72af392994499f8d0525a9f7a80326b78c341bcb04c3e61c52a01827a444c44feff357cc445461ae7367db63d4a250ec778703c54f5578e90a391f93cb2a0ab600b7428d53cb3c8bb970e1e77dd374fa5b38fc9e0218bd93b2badb5d4630798a5be2fc4265af5b1bfef9ea0ed85e22234b1057cf86c84b10a1031d6f088feb09a07ccf10334fa80c4ca03fae4c4a142807a088842bcd8729f5f472c4bc19e32752e6364668c9ba4f006f957d0486643cacbd4693d3044421e892e2836502c21c9214a5c2d509dba38123d1ffc68a410b0a2285be78b8007090f96b14bc08c16bdee8ef22e5088ecc97b2b40e4aa238f9ef223b2a310e12ad9515c4d4eff7df7e5a98e9019489ea19d09e7fd9de774855e94cb6079cc476862c75d1719d20238d5826998ba8fbc748de0a5385dc7a18f2b6bc98d1d2c8f545aa7842c497a962ef0ca643422a056f8429f07c6d0d173f73a7c23197fa1c49a903fb2189b043ee279d51ad267174274af36cdc330180ff9dfd157373b7a3bb4d25f055c08932319049b246e30d0378367394e38d4929068bd39b46502c598a9349dbbb3b8c1534029f127064754b69f212b3d9a97197f52c23599f22feecde7e08d44b888bf9fb1414b253829e88a6251dbe33c2d227f9b6254d6a87adf73cb0bda73b7935e2277c5fcacf897a99d84c568806b748924db249453f28ad7eb1eb77a06cc7c46f9184d25573935ea9dc5927770ea65c00be4af09d54a5ca26af9cc96a547a0f44086a608b770cc187c4f0a80af750d338351975b662e719237d1ab2d1a03a2c1f2aff830ab033e46736675218c28e7201d8102ca85bb2c015bb811054d0284ac3c3b223e1ebc6e09aa94eceacf2c98cd6fa7b5cb91cb1e9589079eb0c938177c6cfef9054e2b7c718512fb400542a62da1fa8174c78953885ed82709227aeb854df074316289a1c68e544042ac3380e00108f3b9bb0727c32df1cacee1120d9ea21510f209c04d15a08dd77f3e323e7ad1c47256b81da4aea9948283a2e3c52be309933f45d9ed655048850fc5588c3490a2f1de74ffa5701c3ce40c84cc3d02cbaa099808ba8f267ceb25b0d1e714d29ac3e4218e94798a2cac5eb09fa74a81e1d505e955f29aea6c931c09b6a1a05514f128ce649efc4c2f855e9141fb45994a3140265d948efa8ef15cd66e0ebdc64181921be34e141f715cb7d17edb285517f33a915aaef3bab2e8c1f902eae9f9318acfed9e8888b5620d5c49f1e90e9b06452a1f544c4acb1a16e843e9170fb90b886ab2926b47fbd5efca8f7c5ecd4c5c92b4f5a8fa29ba80a1673ed0035c6f7c787c975ad23b66611e84025b4737bfc27aee0e8c122e7a47dd288892112a0d9881e67829353a78da72dcecdb36c56183d66f96b4e8edec3210cdd0bc87765594a03357a4589f861e94d640b37e19ef84caa418d4cc546c1f3d5821971bd5bc658ddf938a28a95d0e6d786a696a96a483ec0f0959a87d03ec8e7841fcbcd9ba1d4439ec91c0d21ea5686d8fc149ffd2dcdafdd5b70c4899d0e4eddf0cb6746a647ed59428e86c7a09467b63a2ea55a6ee8ea6f9552938a1d503d438bbd49b3439c70d0fdba7515eb47f8f6740b3df3a8fd793775e5a9104f46c8e0bbeff1c81fcad90904dc5ee82acc54402579be8f25903b905b5d0a1cb624b1156b8537edadd6f6d4aa0d4fb757291b6a44154bf98aa9ea68b53b8dbd60b4e09432ef414976778367fd99ab7b781d68de1c0a99d870c81973493a5b6cf9bc5c2e23f8164775c155b371018614cb46919f05ba80cb45608d195d1462f2dda6ed78274446e2ae878745f200c8f825dda0c3933a4aa87c1768fe953c73e59dae5dca69ca7d57868f632b7270e5726987f022b25b1d8bcb3b0738fb67f3632573a7822d84d8e9075dea962d56c7c54c6c4e1629b39b930147e06ee5ea80ee9553ef75d4ab7bce06ad2a0358dcea3655e23c463e006568d094fb053027691bde1c0893608f118f43bb895f8165aa6c08a430dcff6f49866c33cc3fe24dcc06d73f99bb20105622a83fb2fac53d9e013281a1c8021d0a896de07f0c7f9948fbe6e349ab98f3b5de1137a8c3513ec7e4dd35797fb2c3d8f1adc91978abc1455c1ce6a2a7708d052a91f673439afeb918caf56453f30fccdb10a110b042149d2e1fe2ba7ea03a817893cd2902c781cac804c5e6122c9ac043095c68700714e76c75f76629e5a5da24319b7eea92e9e4018ccb7d2a7dd6209695ed89cf7a014fa8937664fcea2ac176d5cf70827d855f554c73d7b3ba0f23d035b19f78e2f29c89b922ee6888e70e61ecde401810708051d56cd9950b7e15c40cc79ec09ee0ad28fe3d665c120b9b073d1432c5223d48547265f405a8008c3e5cf298e5cf46ef477a568220a867b6efcd5a8d0fcd69146d9a3ff6d3e9c56bc50b93af474c58c7bc526fc52d864cd04e25ddb17cc7f4ae3442dedabdb7d6e75ddb8b6f1ea8fb4e162ba616356fa48bf8bb87d31e550aa970297027c7202e1d2bbbcc87cfa0a41b703c7c0acfd82afc79b10775babd92cbf4583a4cfe94eb330c217d35df3e553e2b7de55a19016ee437bb8cc46509b3905f8addd682337e7e4bec4a0fc824ed55ddbde8f9a023931d9657eaa0fbd000151aef251669b76bf507d663e9ce96e0773dfb39ebfef700f1d258bdf79178abeac26659e581a2d38f8b7954ddd65584551dff3236426089d59c5370f21031835217afee5f19b72f976743454c2d2c15a06ec719e7228a80e9949b4789c63b970b3cb4c96dabd443fbb736adc872fa4e58a9c089b4ca7e6493727236960724368e1d9f8eb6032decb4a1e220e2e2a3300f8d504b723b4dc8652b1865eaf183526756bb5b8316a5b82af82c88c7b6", 0xc2, 0x1000}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) sendmsg$rds(r1, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x1, &(0x7f00000022c0)=[@cswp={0x58, 0x114, 0x7, {{0x59, 0x4}, &(0x7f0000002240)=0x3ff, &(0x7f0000002280)=0xffffffff, 0xffffffffffffff00, 0x4, 0xc7ae, 0x400, 0x32, 0x6}}], 0x58, 0x4000800}, 0x8004) r3 = dup3(r0, r2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) 14:44:15 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6020600}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r2, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4000090) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x101000, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000180)) 14:44:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7, 0x40000) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0x80000000) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:15 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280), 0x4) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc010643a, &(0x7f0000000080)={0x0, 0x9, 0x28}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f00000000c0)="8fe9180136e6dd0f01b909300f226336652e650fdb7b650f01cbdc50432e8ee266b9800000c00f326635002000000f300fabbc478ab814000f00d0", 0x3b}], 0x1, 0x0, &(0x7f00000001c0)=[@flags={0x3, 0x85184}], 0x1) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000200)={'tunl0\x00', 0x8}) syz_genetlink_get_family_id$tipc(0x0) poll(&(0x7f0000000000)=[{r1, 0x4010}, {r1, 0x20}], 0x2, 0x8001) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:15 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x40, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfc000000]}}, 0x1c) geteuid() 14:44:15 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xcec, 0x208002) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x80000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r1, r1, 0x0) [ 1859.156515][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:15 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x400080, 0x0) 14:44:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='pr(c\x00', 0x0, 0x0) chmod(0x0, 0x10000020) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0xffa6) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) write$P9_RMKDIR(r0, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x8, 0x0, 0x4}}, 0x14) 14:44:15 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x3, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x4) 14:44:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfe800000]}}, 0x1c) geteuid() 14:44:15 executing program 0: r0 = memfd_create(&(0x7f0000000080)='#! ', 0xa) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="295acb6679dad1fccb0500576af9faa02a33112c9a8d575937f4b75c0530e197e1ddfa661999991482686b31f0405edf1e49105f856f261bfe8c77f285277fad7b25082b450f09bf9adba4506c1a37f633c90a5362e106b1e0532c845edd21e18649cc6b0ca83c9e5b69c3bcb68e9a474fd741ccc0b3c27fcd5b4a20d749c59f1705bda0aa167fbe871c46e49ca160d31d186edbd8f50dc7b9be19769288dac803b27474373562207e08cb6b4ba590b10bd40144997ad5d01f3dc2ebf62f1a9099b2cea21f3abe0102e43e1813fb5b992ad7ddb83ed4bb9148f8f830928d35000e68c782c45776e969cf56fc"], 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:15 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x31a, 0x8000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="30020000", @ANYRES16=r3, @ANYBLOB="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"], 0x230}, 0x1, 0x0, 0x0, 0x1}, 0x20040041) dup3(r0, r1, 0x0) [ 1859.447839][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:15 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="89e7b975d42940f762860281d0e93800f6cc0000"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:15 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x40800, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000580)=0xbad) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc0f8565c, &(0x7f0000000400)={0x8001, 0xffffffffffffff7f, 0x2, {0xb, @pix_mp={0x80000000, 0x9, 0x4c47504a, 0xf, 0x7, [{0x3, 0x6}, {0x3e0, 0x2}, {0x4, 0x2}, {0x9, 0x8000}, {0x0, 0x1ff}, {0x1, 0x1}, {0x401, 0x7}, {0x5, 0x101}], 0x4, 0x2ff, 0x0, 0x1, 0x1}}}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0xb2f8, 0x2, 0x7, 0x0, 0x2, 0x48510, 0x2, 0x1000, 0x0, 0x3f, 0x0, 0xfc, 0x1f2a, 0x7, 0x6, 0x2, 0x2, 0x8, 0x7, 0x2, 0x1, 0x62, 0xfff, 0x20, 0x1, 0x200, 0x0, 0x9, 0x3, 0x1f, 0x3, 0x4a, 0x5e, 0x1, 0x100000001, 0x0, 0x3, 0x8c9f1f6ae1c722ee, @perf_bp={&(0x7f0000000000), 0x6}, 0x2804, 0x6, 0x7fff, 0xe, 0x4ebe, 0x2, 0x1}, r3, 0xc, r0, 0xb) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000002580)=""/4096, 0x1000) r4 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) r5 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xffffffffffffff00, 0x100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a45320, &(0x7f0000000640)={{0x8, 0x1ff}, 'port1\x00', 0x0, 0x5, 0x7, 0xdf, 0x1, 0x401, 0x7f, 0x0, 0x2, 0x5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r5, &(0x7f00000001c0)="fd36be9ca2dd1ab02e437142871e060940", &(0x7f0000000200)=""/129}, 0x18) 14:44:15 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x800000000000002) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfec00000]}}, 0x1c) geteuid() 14:44:15 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) [ 1859.701806][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:15 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x80000) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-monitor\x00', 0x101000, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x2) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x440000) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000200)=""/202) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f00000000c0)={0x100000000, 0x43, 0x5, 0xe3e9, 0x95b, 0x4, 0x4, 0x9, 0x401, 0x4, 0x47, 0x200, 0x101, 0xffff, &(0x7f0000000300)=""/241, 0x3, 0x3, 0xd5}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:15 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000000)={0x8, 0x8, 0xfff, 0x84000, 0xffffffffffffffff}) dup3(r1, r0, 0x8020) 14:44:15 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U-', 0x1}, 0x28, 0x1) 14:44:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff000000]}}, 0x1c) geteuid() 14:44:16 executing program 2: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) recvmmsg(0xffffffffffffff9c, &(0x7f0000003f00)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000001400)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/176, 0xb0}, {&(0x7f0000001280)=""/163, 0xa3}, {&(0x7f0000001340)=""/182, 0xb6}], 0x4, &(0x7f0000001440)=""/192, 0xc0}, 0x4}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001500)=""/251, 0xfb}], 0x1, &(0x7f0000001640)=""/253, 0xfd}, 0x7}, {{&(0x7f0000001740)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001980)=[{&(0x7f00000017c0)=""/247, 0xf7}, {&(0x7f00000018c0)=""/91, 0x5b}, {&(0x7f0000001940)=""/24, 0x18}], 0x3, &(0x7f00000019c0)=""/108, 0x6c}, 0x80000000}, {{&(0x7f0000001a40)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000002240)=[{&(0x7f0000001ac0)=""/244, 0xf4}, {&(0x7f0000001bc0)=""/142, 0x8e}, {&(0x7f0000001c80)=""/194, 0xc2}, {&(0x7f0000001d80)=""/73, 0x49}, {&(0x7f0000001e00)=""/129, 0x81}, {&(0x7f0000001ec0)=""/84, 0x54}, {&(0x7f0000001f40)=""/237, 0xed}, {&(0x7f0000002040)=""/239, 0xef}, {&(0x7f0000002140)=""/254, 0xfe}], 0x9, &(0x7f00000022c0)=""/20, 0x14}, 0x817}, {{&(0x7f0000002300)=@ipx, 0x80, &(0x7f00000029c0)=[{&(0x7f0000002380)=""/248, 0xf8}, {&(0x7f0000002480)=""/92, 0x5c}, {&(0x7f0000002500)=""/209, 0xd1}, {&(0x7f0000002600)=""/240, 0xf0}, {&(0x7f0000002700)=""/83, 0x53}, {&(0x7f0000002780)=""/103, 0x67}, {&(0x7f0000002800)=""/33, 0x21}, {&(0x7f0000002840)=""/117, 0x75}, {&(0x7f00000028c0)=""/216, 0xd8}], 0x9, &(0x7f0000002a40)=""/174, 0xae}, 0x1000}, {{&(0x7f0000002b00)=@can, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002b80)=""/102, 0x66}, {&(0x7f0000002c00)=""/162, 0xa2}, {&(0x7f0000002cc0)=""/120, 0x78}], 0x3, &(0x7f0000002d80)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000003d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000003e00)=""/96, 0x60}], 0x1, &(0x7f0000003ec0)=""/1, 0x1}, 0x6}], 0x7, 0x40, &(0x7f0000004000)={0x77359400}) getsockopt$inet_int(r2, 0x0, 0x18, &(0x7f0000004040), &(0x7f0000004080)=0x4) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) [ 1859.937248][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:16 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="29705a097fc20f043a7e8d17a8d97df26573360cff58d64c54c1ad399810ee1e63abdd94cae19b70e3d5c35e5b44024ca19b4cad6f9a5f26165000101435f374a43b8224470cd33e39637fd0cc00b9a01cdd739f7d0e9f484abc21f13b3c96f5446d015219c08b2099e7848699b9e3035e4860df219cb109313e00caa4f72d8aff0734bd58a35422904dd13a57b8b9abd378eb78f7d356ee0ceb80a5e5d3710539632765184978fd5b50275c4b5d010bfa83976bcf5cfcecacd8c597954b57b8ab7ba8b6d67decfe3013570716"], 0x4) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f0000004800)={@remote, 0x0}, &(0x7f0000004840)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000004880)={'vcan0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004900)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000004940)={@mcast1, 0x0}, &(0x7f0000004980)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004e00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004e40)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4}}, &(0x7f0000004f40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000059c0)={@multicast1, @empty, 0x0}, &(0x7f0000005a00)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000005f00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8080}, 0xc, &(0x7f0000005ec0)={&(0x7f0000005a40)=ANY=[@ANYBLOB="4c040000", @ANYRES16=r1, @ANYBLOB="035d99602b21c70b26", @ANYRES32=r2, @ANYBLOB="bc00020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000600", @ANYRES32=r3, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400e1aa000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040008000000080007000000000008000100", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="ec00020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400010000803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ffff0000"], 0x44c}, 0x1, 0x0, 0x0, 0x4}, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:16 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10001, 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x310, 0x70bd25, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x4000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r3, 0x0) 14:44:16 executing program 4: r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xac, 0x0, 0x0, 0x0, 0x0, 0xec6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f00000004c0)='/dev/audio#\x00', 0x7, 0x40000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000580)=0x1000, 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x25) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000b00)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000d00)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r2, @ANYBLOB="020126bd7000ffdbdf250a0000000800050005000000540001000800050001000000080006007368000008000500040000000c000700070000000b00000014000300ff010000000000000000000000000001080005000000000008000500020000000800020000000000380003000800040002000000080008000100000008000500000036746e6c30000000000000000000080006000900000008000500050000005362ba6879285f8d9aea9fe689ec35b2dd395ead5b71f922ed21a4a76ecebc4f03598eec1f15c2be89acdffa4f9d8a264803b225e773bf9f6c6038555d4ff16089330774a145df6350fdba3b00"/254], 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x0) syz_genetlink_get_family_id$tipc(0x0) write$binfmt_aout(r1, &(0x7f0000000e40)={{0x108, 0x0, 0xff, 0x137, 0x1ef, 0x7, 0x152, 0x7}, "e9381e5d5db1abb4b9463a478c65e3b214b2f49b41ff78cbb970260ae688acc7a8b9ec47c13cab96b4d68a0d5c854be3f32672f88fef8cf279f469d55563f81bb01259092c52ee434ba469db945a6dfe95f1f0967aa9175d26fb307985900d3abfdc86a5d926883f3930d4ee0a2e4f524184c00c536ca81811d9134c3a23e180ea95f9de8a2d25c53c6ccc601745bf32fd122cf825c253ed3a8cb20a60f10ea2941c0b9aeb1448d9c85035e50203d83bb9", [[], [], [], [], [], [], []]}, 0x7d1) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r3, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000007c0)={0x543, {{0x2, 0x4e24, @multicast2}}, 0x1, 0x2, [{{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e23, @multicast1}}]}, 0x18c) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40046432, &(0x7f0000000b40)=0x3) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100025bd7000fbdbdf25010000003800030008000400020000000800080009000000080007004e220000140002007465616d30000000000000000000000008000500e000000108000500000000001c00039108000400010000000800050000000094080008001f0000000800040004000000"], 0x78}, 0x1, 0x0, 0x0, 0x48801}, 0x4000000) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc010643a, &(0x7f0000000a00)={0x3e, 0x6568, 0x18}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) getdents(0xffffffffffffffff, &(0x7f0000002580)=""/4096, 0x1000) pwritev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="0e6d1be7d13a7e512d08df5acf07d06dabaf8a9b9ea5540f8b9d5e9df669669a5a53afce24f4035e78593da5977ff025886deb27aaf9a4529753a0955b597b3cc3ea6c17abc995e3c45abccd35bbb07e4c3b36886808b426d64a7ed8a24b35ed34a1a1373125fe2a21d8ff10fb7c2579c8033de0693d26fa9def735ca2dcc19b8c30bab7b588b8d456", 0x89}, {&(0x7f00000001c0)="3e99a9b47e57231dbb17921823db0496c193eebf418c2f797b2e36ebcbba1a636122a10a3b33aaa259489729e9b6a8877dd08b5291633a13a9a1031c1d61544f69102e988978eff14ba03ba945b2e35c73b5edec2a9d49fc458770cccf905b8b52973577d807df5a02c5af3f1e1c7876aea520ff27b36393776d6c404858cb0a9c0a4f91c7d83034034cbd930fa1503f79dbc8d60762bd81797ce4c02b804d3a7d24cfac818532ae6ed7c2524b48", 0xae}, {&(0x7f00000000c0)="9e45134cfddec34cd354951cdf4bbf6534ab6f35f1ac08f2790577e3700861f4840f0c3b58bf81f7c725a1dafb9eeee4cf51e85764d3b26c0b6eaaab226099ce4c216816e51be4f6f8b19f0d583fdc21dc587535b9c2dbadd5ad1eea727767a8240f15eef04824c45482a150bae24053922ee2a3777ecd56f419b7c0", 0x7c}, {&(0x7f0000000280)="fca69a78507db3527b5090d8bec4c9006647238ca4678454539de133b75a4e1d2f1dfa", 0x23}, {&(0x7f00000002c0)="0a76e3f83ba045caaa762a68ff66720e632979d0df4d53f33b05bb209e9afecd62e53c18c5952a9d4093480544903e42008a08d80b28ba5bbb2fb99011b684826534ced0", 0x44}, {&(0x7f0000000400)="27a3c3a547ff5ce071e1c3c37f431cc33e5415d4d979c99a871cbad99875468887a252b5536cf3d49c070149d1452031523f3bbb0cbeb9dd50d87d4271cb337fc2cad868c4f1bbbc", 0x48}], 0x6, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000b80)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001640)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000bc0)={0x15, 0x110, 0xfa00, {r5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x0, @remote, 0xc7e0}, @ib={0x1b, 0x1, 0xffffffffffffff2d, {"017894a78bb38d7b6bff3d0aec1d27cf"}, 0x4, 0xbdc, 0xaaff}}}, 0x118) 14:44:16 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) fcntl$addseals(r0, 0x409, 0x4) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff0f0000]}}, 0x1c) geteuid() 14:44:16 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x18) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 1860.222436][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:16 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, '[^self'}, {0x20, 'locgroup$'}, {0x20, '*wlan1vboxnet1vboxnet1eth0eth0\'em1vmnet1'}, {}], 0xa, "13a928bafcccb2b9912b271e80e0d59b5e28b0d77504fb35584c2947ec4d77884b62070bf990f7378da82b"}, 0x71) 14:44:16 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000000c0)=0xe135, 0x4) dup3(r0, r2, 0x0) 14:44:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfffffdef]}}, 0x1c) geteuid() 14:44:16 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x80401, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x40000033, 0x0, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) ioprio_get$uid(0x3, r3) 14:44:16 executing program 0: r0 = memfd_create(&(0x7f0000000040)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:16 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:16 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) fadvise64(r0, 0x0, 0x5, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1ff, 0x0) getpeername$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, &(0x7f0000000240)=0x1c) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) getdents(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x10400, 0x0) 14:44:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffff8d]}}, 0x1c) geteuid() 14:44:16 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) connect$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0x101, 0x81, 0x81, 0x80000001, 0x1, 0x3}, 0x4}, 0xa) 14:44:16 executing program 0: r0 = memfd_create(&(0x7f00000001c0), 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:16 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x5) 14:44:16 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0xfffffffffffffffd) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000200)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) 14:44:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffff91]}}, 0x1c) geteuid() 14:44:16 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "c414cb7fb8041cc4ef4bfe77b539b8cfefafc488"}, 0x15, 0x2) 14:44:17 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x8000, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x80000000, 0x6001) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() fchown(r1, r2, r3) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x800aeef, 0x32, 0x3, r1}) dup3(r0, r4, 0x0) 14:44:17 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x3, 0x400) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f00000001c0)='./file0\x00', r1, r2, 0x400) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000040)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f00000000c0)={0xffff, 0x9, 0x1, 0x5, 0x9, 0x8, 0x80000001, 0xffffffffffffffff, 0x0, 0x8, 0xdc, 0x91f}) 14:44:17 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x106a00000000000, 0x600) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000240)={0x2e, "f8142644a5c44b0abe3646826a4ffef36f771772a887a0966cdbb5df6269f59ea16a861980c39a6d01448fe190f7"}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x101201) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x80000000}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f00000001c0)={r4, 0xdb2e, 0x16, "1d782fc9219693d1a323c5255606cecefd0842b4187c"}, 0x1e) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:17 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x4) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000240)=0x3) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}, {0x2, 0x4e20, @rand_addr=0x9}, 0x95, 0x0, 0x0, 0x0, 0x400, &(0x7f0000000080)='sit0\x00', 0x400, 0x3, 0x8}) r2 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000001580), 0x800) clock_gettime(0x0, &(0x7f00000015c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000001600)={r3, r4/1000+30000}, 0x8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x1) 14:44:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffffc4]}}, 0x1c) geteuid() 14:44:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xa2, 0x20700) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000200)={0x0, 0x4, 0xfa7f, 0x7, 'syz1\x00', 0x4}) uselib(&(0x7f0000000040)='./file1\x00') getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:17 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0x0, 0x2, {0x9}}, 0x18) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r1, r2, 0x0) 14:44:17 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup2(r1, r1) getsockopt$inet6_dccp_buf(r2, 0x21, 0x0, &(0x7f00000001c0)=""/150, &(0x7f0000000080)=0x343) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x80000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000140)=0x3) 14:44:17 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7ff}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xfffffffffffffbca, 0x202) write$P9_RLCREATE(r2, &(0x7f0000000600)={0x18, 0xf, 0x1, {{0x10, 0x4, 0x6}, 0x8000}}, 0x18) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x50000, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x3) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000300)) 14:44:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfffffff5]}}, 0x1c) geteuid() 14:44:17 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x408000, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:17 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x40200, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000000c0)={@loopback, @remote, r1}, 0xc) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:17 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000080)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:17 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) socket$can_raw(0x1d, 0x3, 0x1) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) setxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)=@known='trusted.overlay.upper\x00', &(0x7f0000000280)='proc\x00', 0x5, 0x2) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="a456fa1a100b9374347f5418f76dd1a772202076234164b2a0093f7c6ca78591d85b2889970a6a646cbc5ada6524ee14dbe0d31a15b325e8d050fd935b309cf5f8321d0da0588c06f841ff558a7024f63c571a8a3e95210cc5f23a7310cd170eb2aff7a0911eb461f2283f6dc18b518c294153c9450510734b89bd9013f65f1a89df60326735034e1736b37b108ff75872c917b06ed44884131c0debc371aeea7a"], 0xa, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000003c0)={0x2}) 14:44:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x18f7fb436c2]}}, 0x1c) geteuid() 14:44:17 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0c632c51c6cc138c6964e6000038040000000000000048298d2abc8932e8202264dc6ca1794dac74322dd3e94f29379dfe94391e5abd187225eb19fd137130b23bda7359e18715ca3520453a947bfa5a5d63d3bac71ee793e287cea36b1f42d328c6ac49e6f85be441614be60044e747add10eeee7e01109e0a5a8c65c27"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:17 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x3c3c00) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x4, 0x14, 0x1}) dup3(r1, r1, 0x80000) 14:44:17 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) sync_file_range(r1, 0x1, 0x8000, 0x7) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r3, r4}}, 0x18) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f0000000080)=""/21, &(0x7f0000000100)=0x15) 14:44:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000000c0)='./file0/file0\x00', r0}, 0x10) write$P9_RREADDIR(r0, &(0x7f00000004c0)={0x109, 0x29, 0x1, {0x62, [{{0x80, 0x2, 0x4}, 0x80000001, 0x2, 0xd, './file0/file0'}, {{0xfffffffffffffffe, 0x2}, 0x0, 0x20, 0x7, './file0'}, {{0x1, 0x4, 0x4}, 0x9, 0x4, 0xfffffef3, './file0'}, {{0x8, 0x2, 0x4}, 0x8, 0x200, 0x7, './file0'}, {{0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffff6e, './file0'}, {{0x22, 0x2, 0x5}, 0x8001, 0x5, 0x7, './file0'}, {{0xc, 0x3, 0x8}, 0xffffffffffffff81, 0x87, 0x7, './file0'}, {{0x0, 0x1, 0x5}, 0x0, 0x2, 0x7, './file0'}]}}, 0x109) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x20000000000]}}, 0x1c) geteuid() 14:44:18 executing program 3: ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000000)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x101800) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000000c0)={{0x7, 0x2}, 0x1, 0x48d1, 0x20, {0x101, 0x8}, 0x7e4e7a85, 0x3ff}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000140)={0x401, 0x4, 0x5}) dup3(0xffffffffffffffff, r0, 0x0) timerfd_create(0x7, 0x80000) 14:44:18 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:18 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x2000) r3 = fcntl$getown(r0, 0x9) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000200)='vboxnet0\x00'], &(0x7f0000000640)=[&(0x7f0000000280)='bdevvboxnet0}\x00', &(0x7f00000002c0)='bdevkeyring!\x00', &(0x7f0000000300)='/proc/capi/capi20\x00', &(0x7f0000000400)='cgroup-\x00', &(0x7f0000000440)='/proc/capi/capi20\x00', &(0x7f0000000480)='eth0@\x00', &(0x7f00000004c0)='selinuxGPL%em1\x00', &(0x7f0000000580)='\x00']) ioctl$BLKTRACESETUP(r2, 0xc0401273, &(0x7f0000000040)={[], 0x3, 0x1000, 0x6, 0xc362, 0x8, r3}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x8000, 0x0) io_uring_enter(r4, 0x7fb, 0x4, 0x3, &(0x7f0000000100)={0x2}, 0x8) 14:44:18 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x93) r0 = socket(0x9, 0x4, 0x0) getsockname(r0, &(0x7f0000000200)=@rc, &(0x7f0000000040)=0x80) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x20000, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = memfd_create(&(0x7f0000000080)='#\x00\x00\x00\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) accept4$inet6(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x1c, 0x80000) recvmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000001580)=@sco, 0x80, &(0x7f0000001480)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/75, 0x4b}, {&(0x7f0000001300)=""/119, 0x77}, {&(0x7f0000001380)=""/241, 0xf1}], 0x4, &(0x7f00000014c0)=""/83, 0x53}, 0x40000162) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000001c0)={'ipddp0\x00', 0x8}) memfd_create(&(0x7f0000000180)='#\x00', 0x4) 14:44:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x7ffffffff000]}}, 0x1c) geteuid() 14:44:18 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x3) 14:44:18 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080)=@ng={0x4, 0xd, "a8efb9dd193938269b16549e7cc4f5e4"}, 0x12, 0x2) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) [ 1862.295812][ C0] net_ratelimit: 1 callbacks suppressed [ 1862.295824][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:18 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) getpeername(r0, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x8000, 0x0) 14:44:18 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5000000000000]}}, 0x1c) geteuid() 14:44:18 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:18 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xaeef, 0x2032, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) [ 1862.553647][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:18 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0xffffffffffffffd1, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) clone(0x20000000, &(0x7f0000000000)="6b8af2be95c28477258c7b4481802624b286025dafbd2bb27f637830c152032ec484430a6b2e59405c7dade1430298491e9240", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)="105d6d8c8a88c76d50eb58f8a46cacd80f38651f7cde7c0f291d47cb3276a1b499ad204f14f712cc91972ce07293c533e0c3e219d973fa4980c4d3e882bc6880beb7037691781d99a374c712c1c3442a110aef757aebf6a246ac2afb524ebc185b03b8936e346e566583c59f9169ebbe40b8f1cda960f0f8ce566e99ca008cb136") rt_sigpending(&(0x7f0000000040), 0x8) r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x8, 0x40002) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='veno\x00', 0x5) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000640)) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) bind$rxrpc(r0, &(0x7f00000002c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x8, @empty, 0xa35a}}, 0x24) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:18 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x58) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000400)={0xffffffff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000003c0)=0x8e) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x200000004) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f00000000c0)={0x6}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:18 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1000) 14:44:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xf0ffffff7f0000]}}, 0x1c) geteuid() 14:44:18 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x2000000000000002, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x404200, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="b6000000090000002000000022914bd8db13f7dbf33ff2815c284a1a9f5d002c5ccdf43a3c2c3ccc9d3b5b11cad94a2b74a8f9fffc79a015663b4ccae3653a46de6fa65b903a22c92878ecafa31c1df7dbd6ee047ebba0831bfcc5cf2612064006c2909c5724af9e083f2ba506d54486ecba9360e228b4f0bfc899139c4e516b873f1a74569fd6d7920ce7bbed4cb1b8d0b86550f9b42fefb7d4ae16b471a68c66f1ea972538f7008de231453727bc60ba5d8c5adf5cb96e072b58b5c0924903d47a"]) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x6) 14:44:18 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) [ 1862.764900][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:18 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="29015a09"], 0x4) flock(r0, 0xd) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '+{'}, {0x20, '#! '}, {0x20, '#! '}, {0x20, 'self'}, {0x20, '.mime_typeselinux'}, {}, {0x20, '#! '}], 0xa, "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"}, 0x1032) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x100000000000000]}}, 0x1c) geteuid() 14:44:19 executing program 2: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4, 0x101280) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x4) 14:44:19 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f0000000200), &(0x7f0000000240)) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4080, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0)=0x1, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(r0, 0x0, 0xa3821ab4d82d2b0d) 14:44:19 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x2000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000340)={0x0, 0x75, "16ee8658907421c6f22c1b33f223b4501e40700621f942d7495b478a7902d4e7eecb4178ac01ba72a1c0932379aac6bcd0ec6a233d915585fdba52dc55a9f990d53fb89a99bc09ee32324eeb2a05791a6829820b136c153c7effd0d70a964117279af5d0abf6405a9e5fe4546300d2ee99f48c24d5"}, &(0x7f00000003c0)=0x7d) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000440)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000480)=0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e23, @remote}}, 0x8001, 0x20}, &(0x7f00000004c0)=0xfffffedb) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x4e24, @empty}}}, &(0x7f00000002c0)=0x84) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000000)=0x2) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000001c0)={0x4, 0x0, 0x2017, 0x2, 0x8001, {0x9, 0x400}}) dup3(r4, r4, 0x80000) [ 1863.034590][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:19 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x0) 14:44:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x149080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000300)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), r1, 0x6}}, 0x18) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x8) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40002, 0x0) renameat2(r3, &(0x7f0000000040)='./file0\x00', r4, &(0x7f00000000c0)='./file0\x00', 0x1) 14:44:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x200000000000000]}}, 0x1c) geteuid() 14:44:19 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:19 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x58, 0x8000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x7a4c0c673d00b274}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r3, 0x4, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x53b}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x30}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x20000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000100)=0x2) 14:44:19 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) [ 1863.338891][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:19 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="29705a096144fb1ada9a973734f1184bcb"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0xffefeffffffffffb) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:19 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x300000000000000]}}, 0x1c) geteuid() 14:44:19 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/174, &(0x7f0000000040)=0xae) r1 = syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x20, 0x202) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) write$sndseq(r1, &(0x7f00000005c0)=[{0x6, 0x4, 0x80, 0x101, @tick=0x1, {0x8, 0x7}, {0x8, 0x2}, @connect={{0x0, 0x7f}, {0x5, 0x9}}}, {0xfa, 0x4000000000000, 0xe3c4, 0x8, @time={0x77359400}, {0x80000001, 0xd3}, {0x7, 0x7}, @raw32={[0x5, 0xfffffffffffffff9, 0x800]}}, {0x9, 0x80000001, 0x80000001, 0x0, @time={r2, r3+10000000}, {0x5, 0xe94}, {0xfffffffffffffffe, 0x2}, @addr={0x40, 0xfa}}, {0xd84b, 0xffffffffffff8000, 0x5, 0xcc, @tick=0xff, {0x1, 0x400}, {0x0, 0xea8b}, @result={0x6, 0x2a00}}, {0x8, 0x4, 0x9, 0x1, @tick=0x9, {0x23, 0x1}, {0x400, 0x2}, @raw8={"3cf47c4bfd5cf2637230abf7"}}, {0x7, 0xfffffffffffffffc, 0x8, 0x30000000000000, @time={r4, r5+30000000}, {0x200, 0x401}, {0xbbe2, 0x4}, @raw32={[0x4, 0x10001, 0x7fff]}}, {0x1, 0x6, 0x61, 0x9, @time={0x77359400}, {0x7, 0x9}, {0x2, 0x81}, @raw32={[0x7ff, 0x1, 0x803d]}}, {0x7, 0x3, 0x8, 0x20, @tick=0x3fb0, {0x9, 0x6}, {0x6, 0x9c6b}, @ext={0xfe, &(0x7f00000004c0)="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"}}], 0xe0) mount(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x201000d, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0xa0000) getdents(r6, &(0x7f00000002c0)=""/220, 0xdc) setsockopt$sock_timeval(r6, 0x1, 0x0, &(0x7f00000000c0)={0x0, 0x2710}, 0x8) [ 1863.585145][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:19 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x201100}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x108, r2, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2b}}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x1}, 0x80) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:19 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x404000, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x5000, &(0x7f0000000040), 0x2, r2, 0x8}) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) [ 1863.732038][ T4584] IPVS: length: 174 != 8 14:44:19 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x31, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x81, 0x341400) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000080)={0x4, 0x271c8179, 0x3, 0x3, 0x3a}) dup3(r0, r1, 0x0) io_setup(0x3, &(0x7f00000000c0)) 14:44:19 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) membarrier(0x20, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x0) getsockopt$sock_int(r2, 0x1, 0x3f, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x400000000000000]}}, 0x1c) geteuid() 14:44:19 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x1) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000080)={0x10000, 0x8, 0x136, 0xd5, 0x1, 0xc268de}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1863.855023][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:20 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000080)={0x34}) 14:44:20 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x500000000000000]}}, 0x1c) geteuid() 14:44:20 executing program 0: r0 = memfd_create(&(0x7f0000000040)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000002580)=""/4096, 0x1000) [ 1864.200536][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:20 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x800) socket$alg(0x26, 0x5, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x101001) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000000c0)={0x6, 0x80000000}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:20 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) sendfile64(r0, r0, &(0x7f0000000000), 0xab) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x20) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r2, 0x0) 14:44:20 executing program 0: r0 = memfd_create(&(0x7f0000000180)='#! ', 0x1) umount2(&(0x7f0000000080)='./file0\x00', 0x4) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2303007d1dfb9b2e8b002bb587465c02017b44"], 0xfffffffffffffdbf) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x401, 0x200) openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x420040, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x400, 0x0) execveat(r1, &(0x7f0000000140)='\x00', 0x0, 0x0, 0x1000) 14:44:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x600000000000000]}}, 0x1c) geteuid() 14:44:20 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x60000, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000180)=0x5, &(0x7f00000001c0)=0x4) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x680, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000200)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40000, 0x0) write$9p(r3, &(0x7f0000000100)="feee1cad2d6e2f1c94390c437286fabed69edee0762cf508f5b182549bd8e7c63efc89d40fcd7f4befcf8ca0c5558e48f6735b8fdf7c6db3fceaee9b3684e096cc4ee3d27a5885c51c0fe74e0040c4ee5023ff8d26183428fd4ba7e3edc1caaebe58d49684744b13c6082a3dbb10a8f8d10429972cdd40665688e120328a", 0x7e) dup3(r1, r2, 0x0) 14:44:20 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/stat\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r2, 0x400, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x884) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r3, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/164, 0xa4}, {&(0x7f00000001c0)=""/194, 0xc2}, {&(0x7f00000000c0)=""/6, 0x6}], 0x3) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:20 executing program 2: r0 = getpid() ioprio_get$pid(0x3, r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) [ 1864.556492][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:20 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x800, 0x0) accept4$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000200)={0x1, 0x0, 0x102, 0x7, {0x5, 0x7fff, 0x3aac, 0x80}}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000300)={0x1, 0x9, [@empty, @remote, @random="84902fdc4d98", @empty, @empty, @broadcast, @dev={[], 0x11}, @random="8fdb651dbee4", @broadcast]}) chmod(0x0, 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000240)={0x0, 0x10000, 0x7, 0x84000, 0xffffffffffffff9c}) mkdir(&(0x7f0000000040)='./file0\x00', 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x700000000000000]}}, 0x1c) geteuid() [ 1864.791918][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:20 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x400, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, r1}) dup3(r0, r2, 0x0) 14:44:21 executing program 2: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f00000001c0)="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", 0xfd, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000140)='/dev/ion\x00', &(0x7f00000002c0)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = socket(0x2, 0x0, 0x6) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f00000004c0)=@assoc_id=0x0, &(0x7f0000000500)=0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000540)={0x4, 0xd6d7, 0x8, 0x4, 0xae5a, 0x0, 0x2, 0x1cf, r3}, 0x20) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeee, 0x8, 0xfffffffffffffffc, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f0000000000)=0x1) ioctl$DMA_BUF_IOCTL_SYNC(r5, 0x40086200, &(0x7f00000000c0)=0x3) fsync(r1) fcntl$setpipe(r4, 0x407, 0xea5) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={0x0}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000003c0)={r6, @in6={{0xa, 0x4e21, 0x1ff, @local, 0x8}}, 0x972, 0x9, 0x7, 0x100000001, 0x1e6d}, &(0x7f0000000480)=0x98) 14:44:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x29, 0x8000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x1, @rand_addr="5c68b82a09b24f95ae099ad3aa886277", 0x1000}}, 0x9, 0x2}, &(0x7f00000000c0)=0x88) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e21, 0xffffffffffff39b1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x200}}}, &(0x7f0000000380)=0x84) 14:44:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x800000000000000]}}, 0x1c) geteuid() 14:44:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:21 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x44) timerfd_gettime(r0, &(0x7f0000000080)) r1 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:21 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x400040, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r0, 0xfffffffffffffffe) 14:44:21 executing program 5: syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x800, 0x42001) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e22, @local}}}, &(0x7f0000000440)=0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000480)={r1}, &(0x7f00000004c0)=0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ashmem\x00', 0x44a701, 0x0) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='affs\x00', 0x400, &(0x7f0000000240)='proc\x00') ioctl$RTC_PIE_ON(r0, 0x7005) setxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L+', 0xfffffffffffffffa}, 0x28, 0x2) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:21 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@pppoe, &(0x7f0000000140)=0x80, 0x800) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r3, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x1) 14:44:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x900000000000000]}}, 0x1c) geteuid() 14:44:21 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) timer_create(0x1, &(0x7f0000000240)={0x0, 0x23, 0x6, @thr={&(0x7f00000001c0)="c190a50fdd6ba32a098b17669dc04520ebcf", &(0x7f0000000200)="c32222bad326a07400dff65af5455a594c6753c33fa02261c68ce633341d94a86e8dfd89e36201b64b"}}, &(0x7f0000000280)) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0xb, 0x29, 0xe, 0x9, 0x0, 0x70bd2c, 0x25dfdbfb, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e23}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d4}, @sadb_address={0x3, 0x7, 0x0, 0xa0, 0x0, @in={0x2, 0x4e24, @local}}, @sadb_x_nat_t_type={0x1, 0x14, 0xffffffffffffee97}]}, 0x48}}, 0x1) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0xfffffffffffffe7c) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000002c0)={0x80000001, 0x1, 0x8, 0x3, 0x7, 0xb2bf, 0xfaef, 0x1, 0x2, 0x7fff, 0x3260}, 0xb) 14:44:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xa00000000000000]}}, 0x1c) geteuid() 14:44:21 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000003c0)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r3 = socket$inet_smc(0x2b, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000080)='em0*-\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) r6 = getgid() setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000380)={r4, r5, r6}, 0xc) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000500)=0xfffffffffffffffe) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:21 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x30100) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r1, r2, 0x0) 14:44:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x16a) 14:44:21 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:21 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000140)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:21 executing program 0: r0 = memfd_create(&(0x7f0000000040)='#! ', 0x1) r1 = eventfd2(0x321, 0x80001) fcntl$dupfd(r0, 0x406, r1) r2 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe00000000000000]}}, 0x1c) geteuid() 14:44:21 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000200)={0x8, 0x32, 0x0, 0xffffffffffffff9c}) getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000000)=0x80) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x100}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0x7f, 0x0, 0x9, 0x4, r3}, 0x10) dup3(r0, r1, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) 14:44:21 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3f, 0x400000) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000e8040000ec000000ec0000000000000000000000ec0000001c0400001c0400001c0400001c0400001c04000004000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000070000000000000000000000f52c755baa7619fd00000000000000"], @ANYBLOB="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"], 0x544) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:22 executing program 2: r0 = semget$private(0x0, 0x3, 0x480) semctl$IPC_RMID(r0, 0x0, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x80000, 0x0) getsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r4 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x381402) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000280)={0x3, 0xfff, @name="723f41e35ee68dd374d876f966a97648dc1717c690b74474a447c1f830fe65a1"}) ioctl$KVM_GET_ONE_REG(r4, 0x4010aeab, &(0x7f0000000100)={0x3, 0x7fffffff}) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000140)={0x101, 0x7, 0x7ff, 0x2, 0xffffffff}) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f00000002c0)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000340)={@ipv4={[], [], @rand_addr=0x8001}, @empty, @dev={0xfe, 0x80, [], 0x25}, 0x101, 0x6, 0x0, 0x500, 0x2, 0x10, r5}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:22 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r1 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'eql\x00', {0x2, 0x4e23, @remote}}) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:22 executing program 0: r0 = dup(0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x10, r0, 0x0) r1 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RUNLINKAT(r2, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="29705a09166805719dec47ac7719a9d31a48bda1b5fbdaf47db7596079abe1956e0e27869af588a5b4c8dcc5309b79b2cc09bb56407b5fde50e7a6e31238711e4714bf819d467477e55fbe85a47a3c403fb0ac19083d1d10f3ce3e0ffb87a1478791ea7aabe11aacff8854fe186a463fc7726671c6bd1bc888f6a9d4a9881200e847a7513c14e8368a576c93cedd45ab15c2381dd933a5fbe4f3d445315d4cc078e4477a2b9497cd7aa99862cfc4d12fcac1a5b4a2be5475133371bbb4c144b1287096920ddbe2863a609edc83dee0eb3f"], 0x4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000140)=0x8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000180)=0x8, 0x8) 14:44:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x1000000000000000]}}, 0x1c) geteuid() 14:44:22 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x200180) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r2, 0x0) 14:44:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:22 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) unlink(&(0x7f0000000000)='./file0\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200010}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0xd8, r1, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x41}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffc}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3fa7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3a}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x8084}, 0x8c0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000300)={0x8, 0x2, 0x2, 'queue1\x00', 0xb}) r2 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r2, &(0x7f00000003c0)='\x00', 0x0, 0x0, 0x1000) 14:44:22 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) msgget(0x0, 0x200) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:22 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x60000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x1ec, r3, 0xc00, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff00000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff297}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_BEARER={0x128, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x56cb4457}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x5, @empty, 0x100}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xf3ac, @remote, 0xb0}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0xea21, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffffffffff8}}, {0x14, 0x2, @in={0x2, 0x4e24, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}]}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x10}, 0x4000) 14:44:22 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:22 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES32=r0], 0x7e) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000440)='#! '}, 0x30) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)=0x0) fstat(0xffffffffffffff9c, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000d80), &(0x7f0000000dc0)=0x0, &(0x7f0000000e00)) r11 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001240)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001340)=0xe8) fstat(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000001400)={0x0, 0x0}) r15 = geteuid() getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000002bc0)={0x0, 0x0}) lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000002cc0)=0x0) getresuid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)=0x0) stat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002e80)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002ec0)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in=@dev}}, &(0x7f0000002fc0)=0xe8) lstat(&(0x7f0000003000)='./file0\x00', &(0x7f0000003040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = epoll_create(0x6) fcntl$getownex(r0, 0x10, &(0x7f00000030c0)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003100)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000003200)=0xe8) getgroups(0x1, &(0x7f0000003240)=[0xffffffffffffffff]) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000003280)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000033c0)=0xe8) r32 = getgid() r33 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000038c0)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000039c0)=0xe8) r35 = getegid() r36 = getpgid(0xffffffffffffffff) lstat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0}) r38 = getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003ac0)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003b00)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000003c00)=0xe8) r41 = getegid() r42 = openat$vsock(0xffffffffffffff9c, &(0x7f0000003c40)='/dev/vsock\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000003c80)={0x0, 0x0}) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003d80)={0x0, 0x0, 0x0}, &(0x7f0000003dc0)=0xc) r46 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000003e00)=0x0, &(0x7f0000003e40), &(0x7f0000003e80)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003ec0)={0x0, 0x0, 0x0}, &(0x7f0000003f00)=0xc) sendmmsg$unix(r1, &(0x7f0000004040)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000140)="45e33ef3c6ad3a04539239d4ae2a52a8b1716543eadee6ba0188702c679387f96d2e6620aede8467e92d10bbd005ea", 0x2f}, {&(0x7f0000000180)="39d79b8be829a82ca5efc749c62e7270b66706bf76c55d000577355d0f89a1d66502e0ee8b4771761cd109a41a2b", 0x2e}, {&(0x7f0000000200)="d76fa4d8d8b7d9317e3e3691a3db5e0c6d1a227705a7ceaa0a83415c37f1247d2fcf133902ca24783ab3a7c52aa43e3862593cba8c34d3c3f09b15ef5237fbd77237326f9cd31a0f353c76909061c0a3d6957ad18b8464f296c14e80b81eafc20b446ad84eaf9e357ec5d434c91bbb9df8992a0ea39c8323f092511bfabb66bbb70b5310b68963c2032999957bad984ed5e4700a28a59ef017488d52558d5d146f8de45a58c54f0d2882ee17", 0xac}], 0x3, &(0x7f00000005c0)=[@cred={0x18, 0x1, 0x2, r2, r3, r4}, @cred={0x18, 0x1, 0x2, r5, r6, r7}], 0x30, 0x10}, {&(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000680)="d6651a38d6ca2f3cb8a134d73ebb16ca9c1b3aabb8418ed1643377cf41ec959d5f62081802e636a31e10a10d4e1ce9516b35f2f14e95fbb4e3c7c6faf7f956a3b97d6eac09a68beeaf0ac067f025678a105a942e3b0a5f3e2fc5153b35d21014e0", 0x61}, {&(0x7f0000000700)="7ec708372589aecd87f470eaa61ee339967dd3ce8b012c3614bcf8cf9d58f501d9cadfb8902a783601558d1c830250584211e5ee0dec8bfb3d", 0x39}, {&(0x7f0000000740)="0fed26e0092e8aadf4eea8c8701e5713a048d4d0507d1aee44eb84c16c4819981888edef969bde", 0x27}, {&(0x7f0000000780)="9cc15ec6c9b97f34a7e30ce12ce99aaaca04af12b33d4d854ae380c1576275", 0x1f}, {&(0x7f00000007c0)="621870eda8a53d042b6d9d775cd701169bbb8dcb35d97afd3b95d08513f98cde1f1ef9fd1348ca5e23b5b1ea3e4112603fd1430f37cb825b5996c6f5ba9144329f46d7a45d", 0x45}, {&(0x7f0000000840)="b48dcf604b4bb690d497e218c3dceb5af70d0bc111e3cc3d2f5409e0448fe3708cf732d25f25279171953f93bdb6066c9de0e337f508f693796c63b4f03eaeb454a13f0ddef434b850c950a7dbcb9c1208a9b6d599af7a66eabc812373dc91575a16846bed63ed69d11745e0537edac290758082c228fcc037b4405589d091fd7583ff153258e13e8abe9e1032500adf14bb56699ee3200287417ce2b4d326e589c0a9827d25428d53b0e1c375e6ef5eee60f1e273fe6ccd2e49a72feae5d420c7f0cb7f081449908ef06ac57b06baad9110c8f53cace429998ad32d81cef72f", 0xe0}, {&(0x7f0000000940)="d90d248d720dbb13f6cbcbecdabec3e7382b8eb7c0dd42bfbb29c410e44e60ee352492fd9424fc580ec9ebd590b7945e5cb64481e7b47187d954cd51d4f078ce73131b54c0e4", 0x46}, {&(0x7f00000009c0)="455fc8b93bbc34eb7393fd654d875fdcaef861bead2bb2476b6dd738800f0ac316f857b09b8b445d1e7f0183d5391bbcdccdbdeaa7045e999d5faa7160405f3ba0e2889afee5043376adcade8e39a2553ae8ad15cdefb3af48d763329248c920f7d00a0fc47eba259fe0256832fba9452f1589a15de889e26bcb1935be80101a3ba9d400af687839acf65b44e3e1cc64c6c63e316fd34effcffef9aa7cf370b61c11c6dd4e519ec06eb1ddb9aee5040b0d4fd60a2bacff0ce0c16e5172b223ebb66ebe8dca87f8e8f9a9e5eb38d775932a72aef9bbeaac82e3f59367d29080", 0xdf}], 0x8, 0x0, 0x0, 0x14}, {&(0x7f0000000b00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c80)=[{&(0x7f0000000b80)="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", 0xfe}], 0x1, &(0x7f0000000e40)=ANY=[@ANYBLOB="2c00009b817b4086e9a06800", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="180000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="100000000100000001000000", @ANYRES32=r0, @ANYBLOB="1c0000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0x70, 0x1}, {&(0x7f0000000ec0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001200)=[{&(0x7f0000000f40)="a2d42abbc447a291a6acea9d182dc626d98bd22a805e7c486604933d8dd2c71c2cf757038cc3d2ab7a576eff0276a8f993168f76ebeda9b913b2b65621eaf561aa191b576eb04d408052ceb5ce96aaad5b823c569144527c43667f67fe151b684a136778ef66fe7efc0890b656be5aa09ee88bff517928dd41ca91bdd4ba1c7306b23eb822632293254ce4ba8cd34f6481680a378275a309cf8194dc04b0c7adb66d68801a1b687d61b1b84c4070a8ac9d1e79fb3fb52130dc7cb7f1e1c02032947d5591dc4c", 0xc6}, {&(0x7f0000001040)="b4df79df2d10d32a09d66953a6ca62262c4a38c9fa9c9993b4ebe64adfa485febf430ea6675bd808c8954c1962ff038c330249ba49dfa838e2d837f2585cd91b84442841e4ab57fa5a30475e06845f4575777708d82aa794798645085edf457077c27fac7a7a3a", 0x67}, {&(0x7f00000010c0)="943b1d5a6954abac2955769715d243b606f543a0110bc58bc2938cd685097f2af17226022cd9497a83ae815c1a2bc51f161cfa65f747c7b895f92fcd7fc2e752a3ebbe325d8a3d5cdbad08e60358dd54699e4776e23ce74ff06fd746b58dda4bb5eaa607a7a4f0737606a09172f6669a0e29c31928ff9c81c3f339842d4950cd95dc42dd8860013a87f330c6b9d46adcaa5afcff1ab88a8cf3523027f14be36dbe0a29428b7e7fe3ca3f6144aec32ccdcbfc423ba221028191873e0313a6cfeb2582637a8fff1990df6753357c59588a56fd93216af4a0c671ca2c6fab200f103e880ab2c1e18a38c53a072f", 0xec}, {&(0x7f00000011c0)="3b24eed57642ebef74ea1ab97335ad8f8b8e", 0x12}], 0x4, &(0x7f0000001500)=[@rights={0x18, 0x1, 0x1, [r0, r0, r0]}, @rights={0x1c, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r11, r12, r13}, @rights={0x24, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x14, 0x1, 0x1, [r0, r0]}, @cred={0x18, 0x1, 0x2, r14, r15, r16}, @rights={0x14, 0x1, 0x1, [r0, r0]}, @rights={0x10, 0x1, 0x1, [r0]}], 0xc0, 0x4000}, {&(0x7f00000015c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000002b80)=[{&(0x7f0000001640)="3f5c8e7e0380d80ea1ce41b1c9bcfbdac1d990f0b791454dd065a25f692d2483d940e44a4860ae6ea32ea4899c8f212cbc68d86239709e8fc5c516cd634f41a04b0b23b6df86424febba800e4f0640eae1db40b765d0500fffd29ad353ca0c1ec4fee7ac92a831eb5e042976a0ec8bdd2d1976c10318f34adb59fd95", 0x7c}, {&(0x7f00000016c0)="b9389c6f35283ee5b75306e99975d66e198031eb1d9308a68adba714d17a131f1334f54dc6567b98254159bfede079d3d5a6c4a1a95b4a000e874dd38a7b9af5bd74fd1e503bef6bdc1c3cae2b43f8fe54deb442bf5ab1c1e1fa94ab63ae26fcc127be58612292d5ea6bd3bcd0ed4983f7590b5020b6d1fdb2ea4370f99aa4e06764c0d075f755c468ca79b2144ad826b77387244713fdb0a58e63b69354b57a2d374b16edcb65992c502842f6c907759b651627343bb738f4243109ef3f863628d361584bd940103002bc", 0xcb}, {&(0x7f00000017c0)="8d135ac84ba8a579d2bfc67c350b4da42b491d7341dc7b3e580117c9d33d777dadc60b387d8873a0e5d858dca9e89634aa16cd69ac98598b437937f89f86ca6178d1075b599ff0c7af7ce9caf9d6d5bef83ae8a87f4a7cfdfa5bdb0635ff9f2777a6417d2996133721a708d16269d02c68848597884fda6f95522f03475f0faf6a6f6bff60ec933b55a9de11c9cb3abab7f33080b839a4fe89b3602e36c2a521c25866dbebcb19b0692bf6c7817d444b66172d14bf3e583c1901502c4577abe7d3b998103d84b707a8c96c9e7076a2b4bf716a836f62288e7bbdfc9f", 0xdc}, {&(0x7f00000018c0)="73bb73e4dbed44544b1dbb9aa66a109636204f7525fa0964a5161c71e5f3d93baaa4be1db0ced5ff8ee6f05e1ef7efe8dc2e0953b756caac2552e16094bde6d40a9f050af60332940c84a5d27c6b33a6a5a230a04c1dc7d1d44e547c878133842556d7d335410fd2c92ad33ffc0f6de91aa2181d127f107e7609fe68a34a0825dbfee31bc4e936b04d4e0a5baea008526934956b3f65d628bc690c060cfad809bc", 0xa1}, {&(0x7f0000001980)="9e0d4953f263e02d8900dcda9e7b23a7086e9515d1200dfce5fb62411028d173626cd6ccada5138f0743073cb840d58c5c28b22194498f6d50876f5dbe1e3bbef2b66999a33c28889dffcff245dd902d952f8dbfa77384e6a94c9cb99ab2134f1ec62ebdd94f5db8914a692cc8707c9ba2344e67e62108276e623bfde0ba17a881751bc036a3c906b456ec74df8a0c22dd8043cc54524fbad7d00b39c103e67cdbdb9edda9d6f86fc44b513b8a84cd3d56", 0xb1}, {&(0x7f0000001a40)="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", 0xfe}, {&(0x7f0000001b40)="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", 0x1000}, {&(0x7f0000002b40)="11739fc7", 0x4}], 0x8, &(0x7f0000003400)=[@cred={0x18, 0x1, 0x2, r17, r18, r19}, @cred={0x18, 0x1, 0x2, r20, r21, r22}, @cred={0x18, 0x1, 0x2, r23, r24, r25}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x14, 0x1, 0x1, [r26, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x1c, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r27, r28, r29}, @cred={0x18, 0x1, 0x2, r30, r31, r32}], 0x130}, {&(0x7f0000003540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003880)=[{&(0x7f00000035c0)="950e5b0f0fc0398d24a46a367a2e15927cd5272eb5d5f52aea19bce78f449f963ed25fa6ea93cd98f26a7a059ef33c7d87a76e5f7957c087dde8909c96e20ab69de376b44b8c08163e6852843221c8c630fdb0b09be2028b6009cf1d3cfe3dfd1ab698612088200c8c8da37d0ace80d5d794540a08f12daab5f3c6c6dc6e379ecc508e2cd87af4cc36a29701cb8ae56c22c1c0878d3ea89c176ac42cd639dd70b92837f1eb5b3d45eb103a335921af439ae8835b70e053cd53e0eea30d78b3d5c8e9a859eb618470c088b6d95c53d4a511eefbad2cdf87c96a", 0xd9}, {&(0x7f00000036c0)="3b901708a747e97c388330634181a928869ca8da32fdca55b59ac2808c4a7e8a340e726cb48c069609b0995faae8a0cc6998306df64215aa54e844b2bbbda248d168812bba718b6051057f99b6b2d500438d1c0d337d7a32f2c6df3fb688abcf3d11a9cad366350e34ac3afeb97b22306474ad56cb7c2f72b85dffa7dee82652ecadf41b387fb767836a69fd5f3140c42a3a7848edebbf2fb06a4a9a5a7d081add6f30c54ef9b0a183b341df9287a9ccc8a86e24e1ad855a6fa48d0af3dd88d43a5103f258ad50aed9a856a6ef6904d659300163b450e5024eabbd6bc0210b907e1aa9cd78", 0xe5}, {&(0x7f00000037c0)="cfeaaf2d", 0x4}, {&(0x7f0000003800)="1b3a03c849eecca4806269ae8d161fd8e1132a6680c4b1159930a3511bd839d8c66fddd43b574cead3ec6f028bb42a62c186bd6c04a607aa9509103029e4e8d52a56e97d7e07b23962cbd4d7ff54c05456a2a13cf05c", 0x56}], 0x4, &(0x7f0000003f40)=[@cred={0x18, 0x1, 0x2, r33, r34, r35}, @cred={0x18, 0x1, 0x2, r36, r37, r38}, @cred={0x18, 0x1, 0x2, r39, r40, r41}, @rights={0x18, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0, r0]}, @rights={0x2c, 0x1, 0x1, [r0, r0, r42, r0, r0, r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r43, r44, r45}, @cred={0x18, 0x1, 0x2, r46, r47, r48}], 0xd4, 0x40000}], 0x6, 0x48804) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x1400000000000000]}}, 0x1c) geteuid() 14:44:22 executing program 2: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000000200)={0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}]}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000340)=0x80000000, 0xfffffffffffffffb) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x400041, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r4, 0xc0084320, &(0x7f0000000400)={0x1000000000009, &(0x7f0000000540)="037574c260358a6c06a9156f981efa26478d0f586d03a2a4599f4b672d7e04303fa07d1a54a83b97018ddbe26f422a00c1efb0ffc0b4f2ecd7368338cf374270e56a8adc04108cbb20ac1de654bc34c7b2407b26293bb9d717a3c19e230000f93b115faeba069a2af147c79aad57ae2fe4b7623dd5ffba343d56a722d823c46fdb0a3eb016b0e287683c9b04a04f9ac1b796ccfff9c47b6e179b08aa4ba1eb52a62dff1de27bd81a4acede61e29a7122b540141f6510425fc36d8a2e9a565acfb43479000000000000000000000000000000000000000000000000000000b37f8a6f1ba37bcac4f172a483cf9cfd62bab52eab4aea570a45648665cb0ff7262c1e818ff67647094b339dc0e6aa9589a533ddaa38e3c25d44a1f68a0bfe5ed1c5717dc3c4b3986b20c53040adb84909338e0ce9a6e445cc1047133344d881d8a867f4b32ca4e842aee7327b47c971acdacdfcab35475fe8d866a46ae8f3418f2316473d84c2e5360000e9f4c7e5159da574f11974ce72c72e921a105e637a40f36a9fa626f3e6dcd8343d995c84361bae12dd293aa714657aa21ece765c3950972ee644a9edc9eff743e464b2468718d260af067796d4e32610193f50310c92c75747ea9dae7e79df903a4bd0e47363dfa43b7a04e678b26c9b48d4ce37781e21419cf57d7bf184cb5db60b9cac9bcdfa0306d605871b3ac9babba3400f1b4de7cd8345688926dcf0efc2c5158e4b717d0d761214e01fada52393ce0dfc33216df7efc058c451d30b066fc26a89df45266e845a8ed5dc63d7ee5a5cae40b14909c1792682"}) r5 = dup3(r1, r1, 0x80000) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0x4, 0x32, 0x1, r5}) ioctl$DMA_BUF_IOCTL_SYNC(r6, 0x40086200, &(0x7f0000000140)=0x2) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x8000, 0x0) bind$rds(r7, &(0x7f0000000100)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000240)={r0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000280)={r0, r8}) ioctl$DMA_BUF_IOCTL_SYNC(r6, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:22 executing program 4: syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80, 0x0) getdents(r1, &(0x7f0000002580)=""/4096, 0xfffffffffffffdc7) 14:44:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x1802000000000000]}}, 0x1c) geteuid() 14:44:22 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000100)={0x0, 0x32, 0x7, @tid=0xffffffffffffffff}, &(0x7f0000000140)=0x0) timer_gettime(r2, &(0x7f00000001c0)) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) write(r3, &(0x7f00000003c0)="af7bf565e1774c9bdc8d6e76bfa521a3217f42636ff90053306cbcb0d04723bfd44b7b60d163de8aa2975e4c066ddaa382a77eadaf6da6d69d6079cf3cd7d792835d9165e0899e6a1fdfce48adc6242450a837550f1b39bc08f6e06e3354bcaf", 0x60) dup3(r0, r3, 0x0) getuid() 14:44:22 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x7) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7be5, 0x400) recvmmsg(r0, &(0x7f0000004940)=[{{&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280)=""/193, 0xc1}, {&(0x7f0000000380)=""/218, 0xda}, {&(0x7f0000000480)=""/175, 0xaf}], 0x3, &(0x7f0000000540)=""/142, 0x8e}, 0x8}, {{&(0x7f0000000600)=@alg, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000680)=""/113, 0x71}, {&(0x7f00000000c0)=""/24, 0x18}, {&(0x7f0000000700)=""/135, 0x87}, {&(0x7f00000007c0)=""/219, 0xdb}, {&(0x7f00000008c0)=""/191, 0xbf}, {&(0x7f0000000980)=""/187, 0xbb}, {&(0x7f0000000a40)=""/136, 0x88}], 0x7, &(0x7f0000000b40)=""/79, 0x4f}, 0x8000}, {{&(0x7f0000000bc0)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000c40)=""/46, 0x2e}], 0x1, &(0x7f0000000cc0)=""/52, 0x34}, 0x3ff}, {{&(0x7f0000000d00)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000002140)=[{&(0x7f0000000d80)=""/109, 0x6d}, {&(0x7f0000000e00)=""/158, 0x9e}, {&(0x7f0000000ec0)=""/110, 0x6e}, {&(0x7f0000000f40)=""/163, 0xa3}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000002000)=""/212, 0xd4}, {&(0x7f0000002100)=""/26, 0x1a}], 0x7, &(0x7f0000002180)=""/202, 0xca}, 0x3f}, {{&(0x7f0000002280)=@caif, 0x80, &(0x7f0000002400)=[{&(0x7f0000002300)=""/196, 0xc4}], 0x1, &(0x7f0000002440)=""/207, 0xcf}, 0x401}, {{&(0x7f0000002540)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000003900)=[{&(0x7f00000025c0)=""/252, 0xfc}, {&(0x7f00000026c0)=""/209, 0xd1}, {&(0x7f00000027c0)=""/200, 0xc8}, {&(0x7f00000028c0)=""/4096, 0x1000}, {&(0x7f00000038c0)=""/11, 0xb}], 0x5, &(0x7f0000003940)=""/4096, 0x1000}, 0x2}], 0x6, 0x41, &(0x7f0000004a00)={0x77359400}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:22 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x4, 0x2, 0x1, 0x0, 0x8}) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7ff, 0x8000) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:22 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 14:44:23 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0xbb5b, 0x101000) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="f2da97ac3887a23e450f01b1005000008f694802342a66bad004b800000080efc4431d0fd94ac483296e1800c4a1fd117b10400f01cf0f0648b800800000000000000f23d00f21f835200000030f23f8", 0x50}], 0x1, 0x20, &(0x7f00000001c0), 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000240)={0x1, 0x37c}) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000200)=@srh={0x3c, 0x6, 0x4, 0x3, 0x7, 0x10, 0x7, [@ipv4={[], [], @broadcast}, @remote, @local]}, 0x38) sched_yield() ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) r3 = dup3(r0, r2, 0x0) ioctl$FICLONE(r2, 0x40049409, r3) 14:44:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x2000000000000000]}}, 0x1c) geteuid() 14:44:23 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff702ae2bf890a39ff1b65450f72e760d16e7a859a18839731130d71f0bb6d70afe4d3ddd4d51a3f57efd2b442ac528aa888833f7ad5a153d77b03a3a66a1d44857ad1e02777a5a6e1ee91f009032df9e37dc0ff72bd134c06ec1b5c5c25d60433957f8570a2beb9c5b0a4c0b8b7e5c01fa2cb8cd73343f39aea5389b45d292a8837ca1a2ee52098b499984f68ea1e50b4a770e157fad993e7f083b17b4cdf1b"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000000)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x40) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x40b00) connect$unix(r0, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) socket$unix(0x1, 0x5, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2e, &(0x7f0000000280)="2662136e66ea46db6036cfe712a0b014d515d2497599fa0e2f7ff83dabc12d45891c9cd0d326b3123c719ab014b6ff2c56c40bb06fdc8f72889cd0784e0051affb628d20d429943872a944cef95f45bf702ed4a5e098b0bb807e0c655b20f556ac968f9575f0a9e2bd411b3c89d4d3fff2f84e34f9e7bc3a54111d27f04d2ef2fefc0e8e0ad4e7a1db4f69004510ea750eb8c4cb833bc3a188", 0x99) 14:44:23 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xaef1, 0x34, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:23 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r1, r1, 0x0) 14:44:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4000000000000000]}}, 0x1c) geteuid() 14:44:23 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1010000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:23 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:23 executing program 4: socket$isdn_base(0x22, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1f, 0x2) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="380145c66a4c99fdb884dd0f979c7784", 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ptrace$poke(0x4, r2, &(0x7f0000000040), 0x6) 14:44:23 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xc310b8cb48e14d59, 0x0) getdents(r1, &(0x7f0000000080)=""/196, 0xc4) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r2, 0x0) 14:44:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x4002000000000000]}}, 0x1c) geteuid() 14:44:23 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x12000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) [ 1867.490276][ C1] net_ratelimit: 9 callbacks suppressed [ 1867.490289][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:23 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={0x0}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r1, 0x2, 0x1000, 0x1, 0x3f, 0xa7c}, 0x14) 14:44:23 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000000080)={0x67446698, 0x0, 0x3, 0x3, 0x4, "05258a9c0661edc5e56b53ad130d306f8f73dd5cb760edaddb11f70b00f4f1a31411a5e273d8e1dd23e4ad3eadbc4166f59d"}, 0x42) 14:44:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x5400000000000000]}}, 0x1c) geteuid() 14:44:23 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = getuid() r3 = getegid() fchown(r1, r2, r3) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:23 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) prctl$PR_GET_NAME(0x10, &(0x7f0000000080)) r2 = dup3(r0, r1, 0x0) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000000)={0x8, 0x3, 0x1, 0x80, 0x13, 0x1000, 0x0, 0x8, 0x9, 0x7}) 14:44:23 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000040)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000000)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) [ 1867.756068][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:24 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0xf7bf}) r1 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:24 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x400000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x85) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r1, r2, 0x0) 14:44:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x8) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=""/123, 0x7b) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000200)={{0x1000, 0x200, 0xfffffffffffffbff, 0x3, 0x8}, 0x7fffffff, 0x9, 0x7fffffff, 0xa7, 0x1, "d6d483c3e888867b78bf45883578829df5149213649b1b27d4075ba951b7be36c04e9ba6b25b40fe481a8ae743102f81cc1dfc883074a3ec6e57e3ae8f5ba97fa5f00fd4a2e5640023424d9b4abe4e91c307e40c10cb089d54c42134bf7faf8aef5a6f8e803fad4b8b3b00ec110b19568ef17cd7cc41f47c8731f2eace1946df"}) 14:44:24 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x1) 14:44:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x607f020000000000]}}, 0x1c) geteuid() 14:44:24 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x1, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:24 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2080, 0x0) r1 = socket$netlink(0x10, 0x3, 0x7) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) r2 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:24 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5e43, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000100)={0x40, 0x10000, 0x1000}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 14:44:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x5, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200)={0x2, 0xc1, 0x0, 0x9}, 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x3) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 1868.126734][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:24 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x400) 14:44:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x648e456600000000]}}, 0x1c) geteuid() 14:44:24 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x20000) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2, 0xd922ba22d32d761a) fcntl$addseals(r0, 0x409, 0x53a06b3954275a2b) r1 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="205e4c02f9699b83008073120fe84a64ce"], 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:24 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() getgroups(0x6, &(0x7f0000000380)=[0xee01, 0xee01, 0xee00, 0xee00, 0xee01, 0xee01]) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [{0x2, 0x1, r2}], {0x4, 0x2}, [{0x8, 0x0, r3}, {0x8, 0x4, r4}, {0x8, 0x1, r5}, {0x8, 0x0, r6}], {0x10, 0x8d2cfc58a52b18a3}, {0x20, 0x4}}, 0x4c, 0x0) 14:44:24 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40, 0x0) write$P9_RSTAT(r0, &(0x7f00000002c0)={0x60, 0x7d, 0x1, {0x0, 0x59, 0x66f2, 0x1, {0x40, 0x1, 0x3}, 0x48010000, 0x7fffffff, 0x1, 0xffff, 0xb, '/dev/mixer\x00', 0x5, 'proc\x00', 0xb, '/dev/mixer\x00', 0xb, '/dev/mixer\x00'}}, 0x60) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x200002, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f00000000c0)={0xffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) bind$tipc(r1, &(0x7f0000000200)=@name={0x1e, 0x2, 0x0, {{0x41, 0x3}, 0x4}}, 0x10) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:24 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) pipe(&(0x7f0000000140)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) r3 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='/dev/ion\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000100)={r3, 0x8, 0x6}, 0x0, &(0x7f00000001c0)="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", &(0x7f00000011c0)=""/139) r4 = shmget$private(0x0, 0x1000, 0x78000001, &(0x7f0000fff000/0x1000)=nil) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000001280)=0xfffffffffffeffff) shmctl$SHM_LOCK(r4, 0xb) [ 1868.596237][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:24 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0xc4) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:24 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x8000, 0x0) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000100)={0x0, @local, 0x4e23, 0x2, 'ovf\x00', 0x8, 0x6, 0x3d}, 0x2c) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80585414, &(0x7f00000001c0)=""/78) sendmsg$rds(r1, &(0x7f0000001680)={&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000140)=""/2, 0x2}, {&(0x7f0000000240)=""/23, 0x17}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3, &(0x7f0000001500)=[@rdma_dest={0x18, 0x114, 0x2, {0x0, 0x1}}, @fadd={0x58, 0x114, 0x6, {{0x0, 0xd185}, &(0x7f00000002c0)=0xfffffffffffffffa, &(0x7f0000000300)=0xff, 0x50, 0x8, 0x0, 0x100000000, 0x10, 0x3}}, @mask_cswp={0x58, 0x114, 0x9, {{0x100000000, 0x800}, &(0x7f0000001380)=0x7, &(0x7f00000013c0)=0x8, 0x5, 0x3, 0x7, 0x177a7fa2, 0x1b, 0x7}}, @mask_fadd={0x58, 0x114, 0x8, {{0x9, 0xffff}, &(0x7f0000001400)=0x80000001, &(0x7f0000001440)=0x9, 0x4, 0x100000000, 0x0, 0x100000000, 0x41, 0x4}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x5}, &(0x7f0000001480)=0x3, &(0x7f00000014c0)=0xfffffffffffffffd, 0x0, 0x5, 0x8, 0x20, 0x70, 0x9}}], 0x178, 0x84}, 0x40000) 14:44:24 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="2970da09"], 0x4) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80000, 0x0) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=[&(0x7f00000000c0)='\x00', &(0x7f0000000140)='em0$eth1vmnet1\x00', &(0x7f0000000180)='^\x00'], &(0x7f0000000480)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='\x8blo@ppp1\x90md5sumuser\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='#$}#\x00', &(0x7f0000000300)='[#ppp0]\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='selinux))nodev,nodevGPL\x00', &(0x7f00000003c0)='cpuset\x00', &(0x7f0000000400)='(\x00', &(0x7f0000000440)='ppp1proc\x00'], 0x1000) r1 = shmget(0x0, 0xc000, 0x22, &(0x7f0000ff2000/0xc000)=nil) shmctl$SHM_LOCK(r1, 0xb) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000640)={0x7, 0x3, 0x7}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000004c0)='ip6_vti0\x00', 0x10) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000500)={0xffffffffffffff45, 0x0, 0x301e, 0xee10, 0x6b8f, 0x3, 0xffff, 0x1}) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000540)={{0x7, @name="648bd5a5bd1fa302740a6d0874dc627b5d58826876d7bfc712cd1f720b489334"}, "ccf3bef2064cfc91572a416e9d038678b6ab245b0bc277757462706fcd09410d", 0x3}) 14:44:24 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc48, 0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0xfffffffffffffffd, 0x61, 0xffffffff}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000001200)=""/88, &(0x7f0000000140)=0x58) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000001c0)={r3, 0x1000, "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"}, &(0x7f0000000100)=0x1008) dup3(r0, r1, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000001280)={0xc0000000, 0x106, "181be2f25cb3c61817efe352bb3e1de4c9ea3a2b4bcf09c88ccfb6205a45a796", 0x6, 0xfffffffffffff000, 0x0, 0x100000000, 0x200, 0x7fff, 0x1, 0x0, [0x241, 0x9, 0x5, 0x81]}) 14:44:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x838d0e0600000000]}}, 0x1c) geteuid() 14:44:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x101000) ioctl$RTC_EPOCH_READ(r1, 0x8004700d, &(0x7f00000000c0)) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x400000) ioctl$RTC_EPOCH_READ(r2, 0x8004700d, &(0x7f0000000040)) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) socket$inet6(0xa, 0x0, 0x7e) 14:44:25 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7, 0x101) r3 = geteuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000600)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000880)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000fc0)={0x0, 0x0}) r8 = getuid() lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000010c0)=0x0) r11 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100)={0x0, 0x0, 0x0}, &(0x7f0000001140)=0xc) sendmsg$netlink(r2, &(0x7f0000001200)={&(0x7f0000000300)=@proc={0x10, 0x0, 0x25dfdbfd, 0x54000000}, 0xc, &(0x7f0000000f80)=[{&(0x7f0000000340)={0x10, 0x23, 0x800, 0x70bd27, 0x25dfdbff}, 0x10}, {&(0x7f0000000380)={0x200, 0x29, 0x300, 0x70bd28, 0x25dfdbff, "", [@nested={0xac, 0x7, [@typed={0xc, 0x3e, @u64=0x243}, @generic="fcef9121edef7508392d2c0940cfd1787aac132df91f09df3c25378f345f0fc6660ee697c258e49934adc5ed76a40e6b4ad655512e48926f32d6310de64dc2d3835cee0988488acfdbf335dab0ecfa915a41a4745689455f4ac9bf556b343c0999712587768d1d2c53a867cac2a7b566927d2f31369469564e9bf1e99f844e60e67b5aacb5d3d0bbc22b", @typed={0x8, 0x5c, @fd=r0}, @typed={0x8, 0x9, @uid=r3}]}, @typed={0x8, 0x62, @str='Z:\x00'}, @nested={0x12c, 0x49, [@generic="1c0d781161a97b65c0ba04de22180f16ee107ffc062659b56a28ecee499a999c95e680143ffb7b3bb07aa7ded7a7703dd3f955be2ace957e7a612284dfbe8abc6fc96897a4a61b4c52789b5fb0189e3a0a57214c58a746e7c0b9e0bc9355588171b69923", @generic="3871ac54e20053cc4753e5e662796c284ebedfca4cd53d7151a105042e6e8b56136a08d2d66ad83752836c1e36daeb6996b9925d1a62bcd43b30c4e77a5f110422733577af70a83d6e6a119d44dd0835c208d7860793641cdb15f0c4ac730d27b070dfecce1c1f20fb00b16970113436cd7dbb1d805256afe19dee37ed1aff0493eca626d7fccdad62981ecd50aa3e864e4bf46d12e4e2d6e5ad5c3a96fcc0a134135b379524ded187fce559e5d9e7dc", @typed={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic]}, @typed={0x10, 0x3b, @str='/dev/audio\x00'}]}, 0x200}, {&(0x7f0000000580)={0x5c, 0x39, 0x100, 0x70bd27, 0x25dfdbfb, "", [@generic="239dba1cc36237381205b8f0d98742656351d482b800c8c453bb209064758eb58583aaf15ce280dcbe3ef42b8ac89c567b9319a808d11cc2a0cf4e16efa620f02a21fe4deabafa17e1dc6334"]}, 0x5c}, {&(0x7f0000000780)={0xf8, 0x2c, 0x4, 0x70bd27, 0x25dfdbfd, "", [@nested={0x20, 0x7, [@typed={0x8, 0x29, @pid=r4}, @typed={0x8, 0x73, @uid=r5}, @typed={0xc, 0x43, @u64=0x7f}]}, @generic="be2fb99a496863dd8d712b6517f0d00444d61a723eb70257910eb9aaa29eeaca028b0298cb08542805c8f7a2062f3f41fe30f91313dd3301a33c93a1fe8fc6c22705a6784a82caf7074a0962ed8035d09a590986c2fee3842797f69f037ad6c8405951221ba7005983488cbd073eaaa4ef115fec58b677e489cdb001be5a6c04c158832f7bc825df87c724111194092a55fc812b8bbddf573ec496456d50c68619aa307f166d8b6360e7b46c37b55da5a230f3", @typed={0x14, 0x87, @ipv6=@empty}]}, 0xf8}, {&(0x7f00000008c0)={0x5d4, 0x26, 0x200, 0x70bd27, 0x25dfdbfd, "", [@nested={0x3d0, 0x31, [@typed={0x8, 0x14, @u32=0x1}, @generic="d384d45b6b3a49a740587102844c138a73b17dba5293d6765f582789017e531687cfbcd360f63b6d3f686cc8a343f077205a084b54e1b17969f78c161fc8fb35f2d56618fafda676abfc01514d7a19f0498333d40ce87c5ef8de058e030bab9600db6d65be38da0ebfe33c6a007fd25f14da15959607e517e29a4c8545a9ffa99375", @generic="fa7d8e73ba17565b27832a398cbdf1dfa9937194e854031c450047d08bae47185a630198d315a46262516231b3fdbf2bb0e970f0f4cec9c43988eef0b52669f6eb14d31a1b9436ed523e3bfe446d794b04f506528b26b92eb6e66d193165fdbb6a8833", @generic="a6c3d17d9904a25d7059350f87738b9f834be6d2c6f8a341bcb72cc0916f5cc0eb562c8fbccb7d49816aeca9ed249101d19f46ee7dfa41777966f3633c28ca991a7e07fcad9c29bd90ef3eeadfc62e235e8140460338d4f0d7b8a1c8bb9dab5b198d7f2749929ed0f82433d4ec4a69a3453015e5f3e6fd42638ea731e5c2d56c76b968229b660420438031", @typed={0xe4, 0x37, @binary="dca0972ed2ed6c0ba0147ce7af2ee9d47326a3760e5bc1755d54e9fd2513f1fcb4c29758f3163c8bef9f0d7f32807da02608519f1d61e51dfaac9a0165cb38faf357104ecc9071497716558140c79994a537c8e344cb4affa462e7ee1099a70205c5fd7b7fbd2c3112edde3fc87a764386617ee6f546133956503d093fce608abb08a1d94b7c13d6ec8637b71e87239d4672affae26697f1c58f7fa0cef0a9680a0f8146b46b778844259d64574ec5345b12b384e7d4a7de634999ca20e410f5a1153c426f60f03c54b93ca47303a856a2e962fa29e08aa7681eb80901fa"}, @generic="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", @generic="a7ea135915238b983d4b92be4b47c5cc7817e86528dc5bffa6468c0b6f80c199991cdd1e8859a1465bd805de74f2ba1bd328b4c7bf249b65e51ddc6059d5185a16bc29e2d14b0545e74012af3e04c2af40d44811a1f9373723fb08f7bfb4f6d46cda875f68dcfa79c161b8d3", @typed={0x8, 0x16, @fd=r0}]}, @generic="ba6dada54ddfab5882ee27b731e3d1bacbd14ba46f8314a9b1b5e17f40a1332de2b73efdaf7e0a46da278b3c63a729a0952042ae655f05392c2edd3ed944cdac13d478ba195aa46b74b55b35851bbc85e8f8f53200873fa3e381d020a28f18fb278e0fa1f25782d03adddfd293347938098b20b2a4fe48b4068db0fd7183cb034284c3315ae5c4b0437507d596c8dcb9d817f757be968e09ed5cc254f88a238a03da125e1a386f3583266aabdd47d288ea6b2a6fc6cf86cdf52e91a36f2e4824bf219ea895d6ca11753df0092e858ca239d71804cdd9c1b1b9a58cddfb2c8fed4f5fcab840ff90163a107b7f7c0e7cf38f239a", @typed={0x4, 0x72}, @nested={0xfc, 0x1e, [@typed={0x10, 0x73, @str='/dev/audio\x00'}, @typed={0x8, 0x6d, @fd=r0}, @typed={0x8, 0x74, @pid=r6}, @typed={0x4, 0x54}, @generic="fac498bbf040116f08ebb689ef350e00e61b9300f1fbfd14509b34467954a5b84a5ed4c5cee1ebb416915a157b5128187bba3c7de7c41f4c71bfa7dbf96d39beff3a3d046d40a54993e5009df3e0fb37519ccb6623fa2a2e9220d238be5989d7b7fdcdd3d8112aba8722f40c4fb2b5bcd039e76d8717da3ae1f8e43e70ca5d47ae40364eb2ff0caace5b391a7caae73cb50dba5e377771883cd211711d62d978276e3a80abc413bbaf689469da800dab127e0d77a8ff9f3957da7bb5c37f9a921bfcf8a7b81543f7d865cc", @typed={0x8, 0x5e, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x5d4}, {&(0x7f0000000ec0)={0xa8, 0x17, 0x808, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x23, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="41d0381fc72828c5aaa9445de2b34ec5c6ec82e023b546346def124ba04a27ce727e7684c36bf4b8c587f7328f25c7f9c583580e505caf18e948701aafe8235e3f76319c1de322d7b3adb0c859b5", @generic="36dbd85560b3addc5821b64fbcd83e3c70b659e14a5c173af034dec257ae28bcb7a864f7accd15711d48fbea10ebac88ea543fb00a1c51263c5d016d18979ad26a"]}, 0xa8}], 0x6, &(0x7f0000001180)=[@cred={0x18, 0x1, 0x2, r7, r8, r9}, @rights={0x24, 0x1, 0x1, [r0, r0, r0, r1, r1, r0]}, @cred={0x18, 0x1, 0x2, r10, r11, r12}, @rights={0x28, 0x1, 0x1, [r0, r1, r1, r0, r1, r1, r1]}], 0x7c, 0x5}, 0x800) r13 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r13, 0xc018620b, &(0x7f0000000140)={r14}) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000001c0)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) [ 1868.908896][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:25 executing program 0: r0 = memfd_create(&(0x7f0000000080)='#! \x14\x96..\xc3 :Q+\x01\r\xa3{\xf3zU`\v\xf5\xd1\x1ba\xd8\xac\xcde\xdb\"3e\xd3\x92\x8e\xabq\x84\xe0O2)\x88g8\x8927\xfb', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8d18a9ee"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = dup3(r0, r0, 0x80000) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r2 = getuid() r3 = getgid() fchown(r0, r2, r3) 14:44:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8001, 0x101000) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f00000000c0)={0x7, 0x2, 0x80000000, 0xffffffffffffff80}) 14:44:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x8dffffff00000000]}}, 0x1c) geteuid() 14:44:25 executing program 3: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r0, 0x0) 14:44:25 executing program 5: syz_execute_func(&(0x7f0000000100)="0c13b5b598cd801b69e4f56962f5696200d9d9d0c441395bf91cc18fe9589b26e101edfec4427d822a2adfdfe4da7676f2168f4808eebce00000802000c421513666f3e1dc8fe9509b9b9b000000c1ea01eff265dc5f00c36645363ef8d9ce0faee42c24a1a1460f569f00082640c401fe1d8bf4f4df646736676666430fefb3000000007250314f864f86450f17720d14111d54111d00") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x8) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f00000000c0)=0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 1869.172410][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:25 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) mq_open(&(0x7f0000000080)='/dev/ion\x00', 0x1, 0x1, &(0x7f00000001c0)={0x5, 0x0, 0x8, 0x1, 0x1, 0x7fffffff, 0xfffffffffffffffc}) r2 = getpgrp(0x0) r3 = getpgid(0xffffffffffffffff) rt_tgsigqueueinfo(r2, r3, 0x1f, &(0x7f0000000100)={0x3b, 0x5, 0x8}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 14:44:25 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = dup2(r0, r0) write$capi20_data(r1, &(0x7f00000000c0)={{0x10, 0x5b, 0x3, 0x83, 0xffff, 0xfc}, 0x2a, "cc01e47a7996ebff15ccf7ad0893d1115228ab9e6bb8d2153a1a232a0623a8d992e7187df899c9c7a3ec"}, 0x3c) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="297083bf8b5a09defe8594962e92c0270bd431041634463ae3c1b3b6cdff58b51e82eab1af0d87817547ab736be4e4fec058890bfb5d413c048f066c6a5a654d893962dd2b72a78239ed7600a6c2e3a87a734d91b5f848a483d7e95032f08803923d159e6f8bdeff37b07b277433272b677f5b7b8ac079c147022a284e2768c58d9ca6a62c8c7b02d5a5c6d31cc2bcaed1695658a401"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x8, &(0x7f0000000080)={0x400}) 14:44:25 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000300)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000000080)={@initdev, @broadcast}, &(0x7f00000000c0)=0x8) 14:44:25 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x400000) perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x70, 0x8, 0x9, 0x3f, 0x7, 0x0, 0xffffffffffff0000, 0x800, 0x8, 0x8000, 0x9, 0x1c2328a8, 0x4, 0x0, 0x20, 0x7, 0x100000000, 0x20, 0x5, 0x3, 0x5, 0x5, 0x8, 0x4, 0x7, 0x4, 0x6, 0x400, 0x7, 0x7, 0x3, 0x100000000, 0x2, 0x1, 0xfffffffffffffff9, 0x0, 0x20, 0x0, 0xa719, 0x6, @perf_bp={&(0x7f0000000000), 0xb}, 0x0, 0x5, 0x80, 0x2, 0xffffffff80000001, 0x1, 0x26}, r2, 0x3, r1, 0x2) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r3, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) [ 1869.324714][T14220] Unknown ioctl 19464 14:44:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x91ffffff00000000]}}, 0x1c) geteuid() [ 1869.346295][T14220] Unknown ioctl 1074048665 14:44:25 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)) 14:44:25 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x7, 0x100000000000000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="1a000000bb53598591060000000000009d522ae17a0000"], &(0x7f0000000240)=0x22) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000280)={r2, 0x6d05}, &(0x7f00000002c0)=0x8) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r4 = dup3(r0, r3, 0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000080)=""/189, 0xbd}], 0x1) bind$isdn(r4, &(0x7f0000000000)={0x22, 0xd718, 0x43, 0x8, 0x1}, 0x6) [ 1869.463391][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:25 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x40001, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @reserved}, 0x9) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x8000, 0x3, [0x10f, 0x7fffffff, 0x6955]}, &(0x7f0000000180)=0xe) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r3, 0x2}, 0x8) 14:44:25 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7ff, 0x185000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000200)={0x2, r1}) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xb8ff000000000000]}}, 0x1c) geteuid() 14:44:25 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) socket$key(0xf, 0x3, 0x2) r2 = dup(r0) write$P9_RSETATTR(r2, &(0x7f0000000000)={0x7, 0x1b, 0x1}, 0x7) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) read$rfkill(r2, &(0x7f0000000040), 0x8) 14:44:25 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$TUNDETACHFILTER(r1, 0x400854d6, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r2, 0x0) 14:44:25 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x6, 0x4003) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}], 0x40) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:25 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) [ 1869.756436][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x1f, @remote, 0x3a1}], 0x1c) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000001340)={'syz', 0x3}, &(0x7f0000001380)='enc=', 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000001400)='keyring\x00', &(0x7f0000001440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000013c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r2, 0xffff, 0x4}, &(0x7f0000000280)=ANY=[@ANYBLOB="656e63bd72617720686173683d7368613338342d61726d363400"/77], &(0x7f0000000300)="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", &(0x7f0000001300)=""/19) 14:44:26 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0xaeef, 0x10, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r2, &(0x7f0000000000)="4fd96bc53b918ce49d9303", &(0x7f0000000080)=""/139}, 0x18) 14:44:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc236b47f8f010000]}}, 0x1c) geteuid() 14:44:26 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000280)=""/178) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800a4410}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x78, r3, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @rand_addr=0x33}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000003c0)={0x0, 0xe3, "9248dcab1aa3ca9fe2770e8a6af699dccebb2c8fbe434a5f247490e54f6a74482e36e21e26c4997aba9479218b62645fd95282d760b3182618b90e6204d27a8d7476b3aec669dd7e2b0789065887fe764afc79cd8762c7d0bd7b985b16a179995020da7a9c3832be97a51eda03af5b248ef174bc1faebb38d1c052049ea56b8c72b4dbbe144e476f1740d9e7eb70ba1e1a7b97db2b55ba7efe30e241d71d71e6e59e193cf5114dad72ba9a715e0207151dade491153213bcc0528c7d3ddbc8235ee24d81ab5f8e437c4cfe9a9005cf6c87d88a49ce6760fcbe5969edf5775c3f6464ea"}, &(0x7f00000004c0)=0xeb) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000500)={r4, 0x3}, 0x8) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000100)={0xfffffffffffffe01, @broadcast}) 14:44:26 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000e021e89a5c"], 0x4) write(r0, &(0x7f0000000300)="f87b2d048b3f1fc4dce095e66179d48c63c1d7f401d2f5c59e8b2d6d5611c853f511887c9c2696717f84daade756b8367828e3385f635032e7729aaa987190cfd381333499a842ec2f60c5b612a0f8e59d6675881b1aea694e80f5f66227a2a8d98e513bc17cfde65f6975ed0b64c49d9c65b700e1b829fc081e9aa810be456f3a302a1691b29e5deac9b0", 0x8b) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x404502, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0xfd8d, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000100)) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000080)) [ 1870.057578][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:26 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x4, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x10, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48050}, 0x40) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r3, 0x0) syz_open_dev$vivid(&(0x7f0000000200)='/dev/video#\x00', 0x2, 0x2) 14:44:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getdents(r0, 0x0, 0x14a) 14:44:26 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x400, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f00000001c0)={0xe, ""/14}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f00000000c0)="cdba7f0f0ad5222924601619e68558ab", 0x10) write$P9_RFLUSH(r2, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) 14:44:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xc4ffffff00000000]}}, 0x1c) geteuid() 14:44:26 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x1, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) [ 1870.271251][T15989] Unknown ioctl 21381 [ 1870.289478][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:26 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2b705a9edcfb1e08f59e9e09ab6678e403bad4834a2a78e303162fff1a01cfeacba745a7c9ecdabebe3e0b17289fa2f760fc5636b1ff88696defde2adb3e37029e223e8d22e63dece3707cd6e28421b2c9569a8e71c521d5a80f56006a21764b31e52c1cdc9cab142b8a0e4725b193d3f1d52e084085"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x80280, 0x0) ioctl$VT_RELDISP(r1, 0x5605) 14:44:26 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) fallocate(r0, 0x0, 0x9, 0x6) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000080)=""/213) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x1, 0xaed, 0xffffffff}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x0, 0x2000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x21, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x20000000) 14:44:26 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_reqkey_keyring(0xe, 0x6) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:26 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x400, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xdc7f000000000000]}}, 0x1c) geteuid() 14:44:26 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) memfd_create(&(0x7f0000000040)='+@proc,[@eth1md5sumem0${*\x00', 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:26 executing program 4: socket$unix(0x1, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1132, 0x200) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:26 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x40000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x37, 0x40000) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc0f8565c, &(0x7f0000000100)={0x0, 0x2, 0x4, {0x1, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x7}]}}}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x7fff, 0x30}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r3, 0x7, 0x3, 0x80000001, 0x1ff, 0x7fffffff}, 0x14) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000580)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x1, 0xffffffffffffff9c}) dup3(r0, r4, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000200)) 14:44:26 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000040)=0x1) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe02e000000000000]}}, 0x1c) geteuid() 14:44:26 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x1) 14:44:26 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x105000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000080)=0x4de6e479) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:27 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000300)={0x0, @speck128}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = socket$tipc(0x1e, 0x7, 0x0) setsockopt$sock_void(r2, 0x1, 0x3f, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x48002, 0x0) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000000200)="6dc48303011a076f0ba93adcced3f7f784eecae6a34ef1585f6fb48d73538e2b0ac4ff018546ec40f21f05d25203a1c23c59ead4de6475b22ecdc1f28d75e819f5c4ae2a9fd61cd35d65425f6cd6942cc1a0ab2fc6ec3c456c338753f9510c71db0feb66469b773df7ddd6f7eb6c92a1ed603e5eb2e7d6ddbcbeaaa956b8ce982fad2b11a969ee36720f4f723af510439b19c272b05941d384cf646bb7cdbdafd423ad2c34c5e84bffd0e2a41804179dc9872c6265a200b680b63a1b91611c919f3a271a5fd22488080012b75f7f9d7c13f316") openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x260080, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) r5 = dup3(r0, r1, 0x0) setsockopt$RDS_FREE_MR(r5, 0x114, 0x3, &(0x7f0000000000)={{0x1, 0x3}, 0x48}, 0x10) 14:44:27 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x200) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000400)) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000300)={0x2, 0x0, [], {0x0, @bt={0x2, 0x1, 0x1, 0x2, 0x2, 0xfff, 0xf2, 0x1000, 0x1000, 0x0, 0x3c7, 0x7, 0x200000000, 0xd0, 0x2, 0x25}}}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffff, 0x4000) recvfrom$rxrpc(r2, &(0x7f0000000200)=""/201, 0xc9, 0x2, &(0x7f00000000c0)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) getdents(0xffffffffffffffff, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x4) 14:44:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xe803000000000000]}}, 0x1c) geteuid() 14:44:27 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x400000) r1 = accept4$vsock_stream(r0, &(0x7f00000001c0)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x80000) fcntl$getown(r1, 0x9) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0xf, 0x3}, 0x14) r2 = memfd_create(&(0x7f00000000c0)='&p\xc3oc(ppp0\x00', 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0xb2b, 0x20100) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[], 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fsetxattr$security_capability(r2, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x0, 0x100000001}]}, 0xc, 0x2) 14:44:27 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xaeef, 0x2e, 0x9, r1}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000001c0)=0x1, 0x2) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={&(0x7f00000000c0)=""/35, 0x1221000, 0x1000, 0x1}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0xd9, &(0x7f0000ffa000/0x3000)=nil, 0x3) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000200)=0x2) 14:44:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0xfffffe14) 14:44:27 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) faccessat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000) open$dir(&(0x7f00000000c0)='./file0\x00', 0x400000, 0x2) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r3 = dup3(r0, r2, 0x0) recvfrom(r3, &(0x7f00000001c0)=""/4096, 0x1000, 0x12143, &(0x7f0000000100)=@l2={0x1f, 0x0, {0xbd3, 0x7fff, 0x86, 0xffffffffffff8001, 0xf691, 0x8}, 0x6, 0x7ff}, 0x80) 14:44:27 executing program 5: mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000280)='ext4\x00', 0x200000, &(0x7f0000000240)='proc\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x3, 0x54040) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000003c0)=""/227) 14:44:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xeffdffff00000000]}}, 0x1c) geteuid() 14:44:27 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeeb, 0x0, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x11000000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x4c, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x4c}}, 0x8000) 14:44:27 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:27 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x80000000, 0x10, 0x1, r1}) dup3(r0, r1, 0x80000) 14:44:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xf401000000000000]}}, 0x1c) geteuid() 14:44:27 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x8000, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000200)={{0x2b, @dev={0xac, 0x14, 0x14, 0x24}, 0x4e21, 0x4, 'none\x00', 0x12, 0x4, 0x21}, {@multicast2, 0x4e21, 0x1, 0xb1, 0x100, 0x480000000000000}}, 0x44) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 14:44:27 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x1) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:27 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$tipc(0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x248000, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r0, 0x500, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x800) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r3 = getpid() syz_open_procfs(r3, &(0x7f0000000580)='net/sco\x00') timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x400) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10c, r5, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3586}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe8d}]}, @TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x127}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcac8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x20040040}, 0x40084) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:27 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xaeef, 0x32, 0x0, r0}) dup3(r0, r1, 0x0) 14:44:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xf5ffffff00000000]}}, 0x1c) geteuid() 14:44:28 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = msgget(0x3, 0x150) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000040)=""/134) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000200)=""/245) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:28 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x101c00, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000001c0)=""/238) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc0f8565c, &(0x7f0000000400)={0xe26, 0x3f, 0x1, {0x4, @win={{0x3ff, 0xfffffffffffffffa, 0x7f, 0x2}, 0xf, 0x5, &(0x7f0000000340)={{0x4, 0xfffffffffffff800, 0x6, 0x7ff}, &(0x7f0000000300)={{0x1000, 0x7fffffff, 0xff, 0x70e}, &(0x7f00000002c0)={{0x7, 0xd9, 0x3, 0x1000}}}}, 0x127, &(0x7f0000000380)="a69fa16f8d98e1f6378a76bdcb69aaf8d4862c3aa45b6a6bcca8c0b462704ed17ae2d5923de160daa1c18603df9fdbbfb834d47fa9a10be9d91634f55bd6f652fb379cfeddf4dfdf3144bcca1f0550ec12512f87224a69bf4a70ecc90d0fc12b49509e82bffa5b102d508e43b31029c65d475fceeb0781982d7ebfff", 0x401}}}) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000100)=""/97) 14:44:28 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="29705a091d8095b0b74abb213065b64bee35f0b04dc72ee3851fdd39736c782bd2b88a7e8abc9cb00e101c406bcbdbb9c43666b6c45258179a0f707aa75c9f07867f27f80cd020d98b6f385dca9468f012a9113ff13ed9817c149b559f16b4237570854da4c13b62ab5f2a1bee4737a44acdf0004fcefb0f8e3f932c9e9271f72239211191c024a50a6e17c6d815d5fc21d400f87c14f76fb627e1fdfdfd54e0a23b7b6c5ee50ea9"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3f, 0x101000) sendto$rxrpc(r1, &(0x7f0000000300)="c382a21b4ef69926292dd78c2cc8d6abe84ba58f625a8d7f41424f1bcfcb35f426b2fdc7c5f3059c5e2cb5feeef373847fe818be66ee8d02a2cd90a46224ad490f56688b033ef1c4bb721ee767f203eee9db910f7eda1e92fe38dd3482684c02f4b5db4e8cf768f736", 0x69, 0x4, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40880, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x41001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0xc1f, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000004}, 0x4000) 14:44:28 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7fffffff, 0x0) write$P9_RREAD(r2, &(0x7f0000000100)={0x43, 0x75, 0x1, {0x38, "c83b6d08132968430ae6d048b96536d1d73136944f64c3553e59194f870dcd8c18fb62ff484c8ba86390f001bb97391b4cfdc8474cf6bbeb"}}, 0x43) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40083, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc004240a, &(0x7f0000000080)={0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r4, 0x641f) 14:44:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000040)={{{@in=@loopback, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000001c0)=0xe8) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfc00000000000000]}}, 0x1c) geteuid() 14:44:28 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = dup(r0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0205710, &(0x7f0000000000)={0x0, 0x200, 0x81, 0x8001}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000080)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) personality(0x400000d) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) timer_create(0x5, &(0x7f00000000c0)={0x0, 0x4, 0x4, @thr={&(0x7f0000000040)="b2f77103b249912e5dd233e436e20101058fc493eb1c1b3e816cea54fe87588b2304aaf41d34abcec017546ac7e0d33de7fcb11b5c8eade9a99fff1d", &(0x7f0000000200)="bbee7301bf022be4c6498ee774f904f86d46c15425416a880ff45883d54fa7ab0754dafa4b0bed1eed500a429c574196824669b36c29e36baf96f589562fdcc5bc3a500ce5172763974cbad4650b9993c7e7745db4d4bca9f4b73e37137181da6a706df7f89f4998e10ed5a647ed32b4ff9cca969561cbff118cd58ed933bdef35feb14d4de238e8a251b9a5efb0dfe47101894b691cad43417e306d54b015c75f37365063c614ecd2f264e84b7185a3413ba164"}}, &(0x7f00000002c0)=0x0) timer_delete(r0) getdents(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x9, 0x3, 0x2c4, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, &(0x7f0000000340), {[{{@uncond, 0x0, 0xc8, 0xf0}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x2, 0x1, 0x2}}}, {{@ipv6={@empty, @rand_addr="79254e2159ac8ee68a3fc1df8feb5c23", [0x0, 0xffffffff, 0xffffff00, 0xff000000], [0xffffff00, 0xff, 0xffffff00, 0xff000000], 'dummy0\x00', 'hsr0\x00', {}, {0xff}, 0x3a, 0x4, 0x0, 0x46}, 0x0, 0xc8, 0x108}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x100000000, 0x2, "884c25871b172b37d616ca5960ee18568f9b309adfc8d90bd52505908a5d"}}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x320) 14:44:28 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r0, 0x3) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20080, 0x0) 14:44:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfe80000000000000]}}, 0x1c) geteuid() 14:44:28 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200200, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) dup(r0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f00000000c0)=0x246c) execveat(r1, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0xfffffffffffffffc) 14:44:28 executing program 5: r0 = memfd_create(&(0x7f0000000040)='em0\x00', 0x2) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fe9000/0x13000)=nil, &(0x7f0000000200)="8cf8044cda9a096b539b4c2336dcd5bbce0694ef2666dd37e2948f2c3ba9424afd4d195432881e306b468884796a378b3d33e52db9e7bdae71f4c4d3067a9057729236d13444c1494cd8c2bffcab", 0x4e, r0}, 0x68) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:28 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x404000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000140)=0x4) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x113001, 0x0) setsockopt$TIPC_GROUP_LEAVE(r3, 0x10f, 0x88) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f00000001c0)) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x40000002) 14:44:28 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f00000000c0)={0x5, {0x4, 0x6, 0x9, 0xb12d}}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r3 = dup3(r1, r2, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000000)) 14:44:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xfec0000000000000]}}, 0x1c) geteuid() 14:44:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7ff, 0x80) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x20040) fanotify_mark(r1, 0x4, 0x1000, r2, &(0x7f0000000080)='./file0\x00') timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000002580)=""/4096, 0x1000) 14:44:28 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000500)) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0245629, &(0x7f0000000600)={0x0, 0x2, 0x3, [], &(0x7f0000000040)=0x7}) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='Teth1)/}nodevwlan0security\x00', &(0x7f0000000140)='#! ', &(0x7f0000000180)='trusted\x00', &(0x7f0000000200)='#! '], &(0x7f00000004c0)=[&(0x7f0000000280)='\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='/dev/vbi#\x00', &(0x7f0000000340)='/dev/vbi#\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='#! ', &(0x7f0000000440)='/dev/vbi#\x00', &(0x7f0000000480)='/dev/vbi#\x00'], 0x1000) r1 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x4001000) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000540)={0x1, {{0xa, 0x4e21, 0x77f9, @rand_addr="fd16732d28b0a4a64272808024837bd7", 0x4}}}, 0x84) 14:44:28 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:28 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7f, 0x101000) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xaeef, 0x32, 0x1, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) [ 1872.653218][ C0] net_ratelimit: 8 callbacks suppressed [ 1872.653229][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:28 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x208080) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000080)={0x5, 0x0, [{0xb, 0x2, 0xffff, 0xa80, 0xfffffffeffffffff}, {0x80000008, 0x0, 0x7, 0x81, 0x57}, {0xc0000000, 0x40, 0x80000001, 0x5, 0x2}, {0x9a18d4a53890cf0a, 0x800, 0x1, 0x4, 0x6bf}, {0x7, 0x40, 0x8, 0x9, 0x8000}]}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r2, r2, 0x0) 14:44:28 executing program 0: syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff00000000000000]}}, 0x1c) geteuid() 14:44:29 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x4, 0x610840) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f0000000140), 0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4f, 0x4, 0x3, "2c9aeb1e262d948d3af012a647a0a314", "fed1ebe767ceeac736d1d64df437a98a0c27b200de75c6be8ac35d585b5e17e3c0710467d8cd6359fa55383665d9463f77835d8948c5e98221b1"}, 0x4f, 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x2, &(0x7f0000000000)=""/146) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x2, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) 14:44:29 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="083087201eae483a05623f1f7d76d0f66eadf3c181b786756be220284af93dfd69eabab5782d07030c22f733577aa8060ea3b2e5a060375d4825b828ffe0d5f3b3cae99c0cd786fe3a79f50822b13254b7809581394a1d75824f2ed8c7b8b74db7b910a20cf570b76275840a55491baeef7f0fb8aaec986dca4ef0ed662673bef93deee4f5f333c7d1035c1eda5442693dde9a3afe8179d53a7f607de3dc9e0aa08d", 0xa2, 0xfffffffffffffff8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) keyctl$invalidate(0x15, r1) write$P9_RCREATE(r2, &(0x7f00000002c0)={0x18, 0x73, 0x2, {{0x0, 0x3, 0x7}, 0x1}}, 0x18) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r3, 0x0) bind$pptp(r2, &(0x7f0000000280)={0x18, 0x2, {0x1, @multicast2}}, 0x1e) [ 1873.006759][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:29 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0xfffffffffffffff7, 0x4, 0x8, 0x2, 0x4, 0x9, 0x9, 0x1000, 0x9794, 0x20, 0x0, 0x5000000, 0x3f, 0x0, 0x9]}, &(0x7f0000000480)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000580)={r3, 0xfffffffffffffffa, 0x10}, &(0x7f0000000500)=0xc) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000200)={0xfffffffffffffffb}, 0x1) r4 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x80) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000100)={0x1, 0x0, {0x9, 0x124, 0x1012, 0xf, 0xf, 0x0, 0x0, 0x4}}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0xff, @local}}, 0x9, 0xffffffff, 0x1, 0x79df, 0x80000000}, &(0x7f0000000300)=0x98) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000340)={r5, 0xbe8}, 0x8) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:29 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000e40)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x8000, 0x0) chmod(0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000e00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000280)=@newtfilter={0xb14, 0x2c, 0x1, 0x70bd2d, 0x25dfdbff, {0x0, r2, {0xf, 0xf}, {0xffff, 0xd}, {0xf538ae33d6f93065, 0xffef}}, [@TCA_CHAIN={0x8, 0xb, 0xfffffffffffffffa}, @TCA_CHAIN={0x8, 0xb, 0x7}, @filter_kind_options=@f_fw={{0x8, 0x1, 'fw\x00'}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0x17, 0x17}}]}}, @filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x26c, 0x2, [@TCA_U32_SEL={0x234, 0x5, {0x9, 0x5, 0x9, 0x1c3, 0x200, 0x835, 0x81, 0x5, [{0x3a, 0x1, 0x9, 0x200}, {0x3, 0x81, 0x1, 0x2}, {0x3, 0x4, 0x93b, 0x2}, {0x0, 0x7, 0x80, 0x8}, {0x1, 0x7fff, 0x8000, 0x1}, {0x80000001, 0x8001, 0x81, 0xff}, {0x7, 0x4, 0x7, 0x5}, {0x3, 0x1733f60700000, 0x800, 0x1}, {0x1f, 0x15, 0x200, 0x8}, {0x81, 0xfffffffeffffffff, 0x6, 0x4}, {0xffffffff, 0xfffffffffffffffb, 0xd0, 0x9}, {0xb7, 0x101, 0xdc5d, 0x49f}, {0x80000001, 0x48e5, 0x3, 0x8}, {0xffffffffffffffe0, 0x0, 0x8}, {0x1, 0x10001, 0xfdf5, 0x3000000000000000}, {0x800, 0x4, 0xaf54, 0x2}, {0xb6d, 0x4, 0x8, 0x6e2}, {0x3, 0xfffffffffffff801, 0x3ff, 0x9}, {0x835, 0x7, 0xee, 0x3fd}, {0x0, 0x400, 0xff, 0x2}, {0x1, 0xfffffffffffffffe, 0x8, 0x2}, {0x1, 0x1, 0x7fffffff, 0x1000}, {0x40, 0x2, 0x80, 0x5}, {0xe8f, 0x9, 0x1ff, 0x6}, {0x1, 0x0, 0x0, 0x80000001}, {0x8, 0x7fff, 0xfffffffffffffffb, 0x9}, {0x0, 0xd811, 0x101, 0xfffffffffffffff8}, {0x400, 0x10000, 0x3, 0x10001}, {0x89, 0xffffffff, 0x1000}, {0xfffffffffffffffe, 0x0, 0x5}, {0x100, 0x7, 0xfffffffffffffffd, 0xef}, {0x2, 0xd3, 0x100, 0x3}, {0x40, 0xc, 0x200, 0x2}, {0x0, 0x7fffffff, 0x7, 0x80000000}]}}, @TCA_U32_DIVISOR={0x8, 0x4, 0x7b}, @TCA_U32_INDEV={0x14, 0x8, 'bond_slave_1\x00'}, @TCA_U32_LINK={0x8, 0x3, 0x800}, @TCA_U32_MARK={0x10, 0xa, {0x0, 0xfe4}}]}}, @TCA_CHAIN={0x8, 0xb, 0x8}, @filter_kind_options=@f_matchall={{0x10, 0x1, 'matchall\x00'}, {0xe0, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0x0, 0xd}}, @TCA_MATCHALL_ACT={0xd4, 0x2, @m_connmark={0xd0, 0xe, {{0x10, 0x1, 'connmark\x00'}, {0x20, 0x2, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x9, 0x0, 0x3000000f, 0xa68}, 0x9}}}, {0x98, 0x6, "73847ffe06e76f4849104ff861a297900fc5460835564b03debf06a672d42e41f04cdac8564c88fc87f4fa2af45edd813a9d71f735792cbbf866da3e24a12f6652b736250633bce5102075769e2e78acd19e08b895ec4c2a2dfe4f1e0f16c06c039a6ee3a1e02b951c8932e99944f602ce5a6a50c6fff0a8c1983d6fe8ea495018e3adb75f65e0bd5dbefc016b392d339263393f"}}}}]}}, @filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x748, 0x2, [@TCA_BPF_ACT={0x164, 0x1, @m_skbedit={0x160, 0xa, {{0xc, 0x1, 'skbedit\x00'}, {0x6c, 0x2, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x1, 0x1, 0x8, 0x2, 0xba1}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x8, 0x4, 0x4}, @TCA_SKBEDIT_QUEUE_MAPPING={0x8, 0x4, 0x2}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0xfff}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x3, 0x81, 0x6, 0x3f}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x8, 0x4, 0x10000}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0xffffffffffffffff, 0x9, 0x1, 0x8, 0xfd}}]}, {0xe0, 0x6, "7b1dcb88eaf914e97893adef67935cc4e43e62a58c1272e084df7e3031666e3b70165a31bf3aef86477d3dbf43ff2c4e5e3f4dcad594bf8bfab6311292ef08f42ce6aee24931d52ede16350e060fe5a30542b1f71255d99950c75179aa2afd5ec0c156f8cc75666cca43cdc1dd256b498fa35d599beb1f7b1072b254090f7ba8765d93b75632dd48202597284ca5c0d782128e47f84ba08ed4e47a9fe3306f0bf2e5e2e0e2866470beea471326bbefed419763d87250b84d997b317820a19dc7fbbcdc42667599cfe269e09e8f474fd87e6bc5ce43deda719b"}}}}, @TCA_BPF_FD={0x8, 0x6, r0}, @TCA_BPF_POLICE={0x408, 0x2, @TCA_POLICE_RATE={0x404, 0x2, [0x7f, 0x0, 0x31, 0x6, 0xffffffff, 0x100, 0x5, 0x2040000, 0x2, 0x9, 0x6, 0x2, 0x1f, 0x200000000, 0x5, 0x0, 0xffffffffffffff80, 0x1, 0xffffffff, 0x1000, 0x7fffffff, 0x5, 0x7, 0x7, 0x8001, 0x8, 0xfff, 0x0, 0x3ff, 0xdaa, 0x3, 0x1, 0x1, 0x9, 0x200000000000000, 0xfffffffffffffffa, 0x0, 0xce, 0x209, 0x100000000, 0xff, 0x7, 0x7f, 0x0, 0xffffffffffffffff, 0x7, 0x5, 0x0, 0x80000001, 0x5fb, 0x9, 0x0, 0x2, 0x7fff, 0x5, 0x1f, 0xd45, 0x47a3, 0x1, 0x800, 0x3, 0x6, 0xfffffffffffffffd, 0x5, 0x8000, 0x2, 0x9, 0x2, 0x6, 0x8001, 0xfff, 0x101062ce, 0x7, 0x4, 0x3, 0xfffffffffffffff7, 0x18c2, 0x3, 0x9, 0xfffffffffffffff7, 0x20, 0x7, 0x101, 0x7, 0xffffffff, 0x2, 0x7, 0x4, 0x3, 0xcfb, 0xd2c, 0x5, 0x7ca4, 0x8, 0x8, 0xff, 0x7fffffff, 0x5, 0x8, 0x7fffffff, 0x1e, 0x3, 0x9, 0x800, 0x6, 0x3, 0x9, 0x3, 0x6, 0xfffffffffffffffb, 0x5839194c, 0x800, 0x0, 0x200, 0xe5, 0xa73f, 0x7, 0x0, 0x32, 0x7, 0x6, 0x100000001, 0x0, 0x80000000, 0x7, 0x9, 0x9, 0x7, 0x100000000, 0x1f, 0x2, 0x8001, 0xfffffffffffffff9, 0x8, 0x40, 0xb3, 0x0, 0x936, 0x4, 0x200, 0xeb47, 0x1, 0xffffffff, 0x3ff, 0x0, 0x5, 0x3f, 0x1, 0x7ff, 0x2, 0x1ff, 0x992f, 0x0, 0x40, 0x4, 0xd78b, 0x10000, 0x3000000000, 0x6, 0x0, 0x0, 0x4, 0xb4, 0x1, 0x8, 0x4, 0xc6, 0x2, 0x505, 0x893, 0x1f, 0xdf, 0x401, 0x0, 0x0, 0xc14, 0x80000001, 0x4, 0x7fff, 0x2b, 0xfffffffffffffffe, 0x0, 0x470b8f44, 0x7, 0x98f, 0x30023f36, 0x6, 0xfffffffffffffff9, 0x9, 0x800000000000000, 0xa2b6, 0x101, 0x9, 0x8, 0x7, 0x8, 0xffff, 0x4, 0x5, 0xe4d1, 0x2, 0x3, 0x6878, 0x5, 0x400040000000, 0x6, 0x9, 0x2, 0xd3, 0x1, 0xfffffffffffeffff, 0x3ff, 0xe4e5, 0x100000001, 0x1, 0x1ff, 0x8, 0x9, 0x5, 0x6, 0x2, 0x2, 0xc7, 0xef67, 0x7, 0x5, 0xfc00000000000000, 0x0, 0x6, 0x9, 0x100000000, 0x3, 0x7, 0x1f, 0xd2df, 0xf26, 0x80, 0x9, 0x28000000000000, 0x9, 0x9, 0x9, 0xacd, 0x94a, 0xae8f, 0x80e, 0x6, 0xffffffff, 0x10000, 0x1, 0x4, 0x1, 0x10001, 0x100, 0x0, 0x80000001]}}, @TCA_BPF_CLASSID={0x8, 0x3, {0x806c1b86864ef644, 0xffff}}, @TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x7}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_ACT={0x148, 0x1, @m_skbmod={0x144, 0x6, {{0xc, 0x1, 'skbmod\x00'}, {0x4c, 0x2, [@TCA_SKBMOD_ETYPE={0x8, 0x5, 0x2}, @TCA_SKBMOD_ETYPE={0x8, 0x5, 0x8001}, @TCA_SKBMOD_SMAC={0xc, 0x4, @local}, @TCA_SKBMOD_ETYPE={0x8, 0x5, 0x80000001}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0x81, 0x1, 0x20000001, 0xffffffffffffffff, 0x6}, 0x10}}]}, {0xe4, 0x6, "1e679b446920d9706ce56e29f6dd4d89183338a74ba30d66213e662fff1fbdd1f909e7185996c3dd00a224c563a44bfaf785d7d476ef6cdc948b687d532cef8c3bcc4ed25eb58c87546bf71cde422ed2fb247aeb0ceb17b451ba63d706cb13ca11790cb514d404a0a774f0adbbdce4d8eaed462d13d1c3f34f1132624901981b50514ba69387d125602f846befd6bb8f16f18520ba8499cdeea361a9333ae091859888060f4ebd84d80520032373c05f8f9d7024c64483c5f193e29b8283844d74b310609598ef618f173a60c90e9663cc8095b6c2e1381b2c43e2be887e2e"}}}}, @TCA_BPF_ACT={0x6c, 0x1, @m_skbedit={0x68, 0x4, {{0xc, 0x1, 'skbedit\x00'}, {0x3c, 0x2, [@TCA_SKBEDIT_QUEUE_MAPPING={0x8, 0x4, 0x5}, @TCA_SKBEDIT_PTYPE={0x8, 0x7, 0x3}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0xffffffffffffff4e, 0x3, 0xb53907c0559436e4, 0x9, 0x7}}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x8001}, @TCA_SKBEDIT_QUEUE_MAPPING={0x8, 0x4, 0x22}]}, {0x18, 0x6, "6155f56c5ab80a01f3fa31f40bc94b2594"}}}}]}}, @TCA_RATE={0x8, 0x5, {0xa4, 0xfffffffffffffffe}}, @TCA_RATE={0x8, 0x5, {0x7fffffff, 0x6}}]}, 0xb14}, 0x1, 0x0, 0x0, 0x20000800}, 0x40000) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:29 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3f, 0x400000) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000200)="da294e1a70388225f8a8a2b6a9fd3c506e79a34cd8c750d7927728ca2f0a9da61687dc330fbad67648ea913dea5b9a94821aaa28c9824a4256673f2d25fde2bba4614723ed0a201d68eb44738cafba071cd239ee4b5735ff9cf2c11e7b183e6b3bc95b70cf9826898765bbbcc5ad62dae38e520517571f9267bf8e4723c4c514a86999e1c7f26b9d4bfd0cef4fd30a37bea33f8e2b1262c5539cb2ce2453c493") execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xff0f000000000000]}}, 0x1c) geteuid() 14:44:29 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c, 0xfe426675da8a92ae) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x1000, @empty}], 0x10) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x800000000, 0x680080) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x9, 0x7, 0x9, "26301e1e0900bfc135194804a75077bb3af6b62465ca32d7a9a4e97b99d86b90533f6b6f98103adbb748058e537592c6a84aef0f4b6396fafd378862b9c710fd", "bc760d5a37ce18991cd0b2ac46707bc5aab1150bebb9154a41306582abb8eb6726856ffbbea4e3e73c2215c2085edc13e63f7a58a69521dd22d5bbcb8bca230e", "75857a4d150ebf0f3f563512f72c3005616bb0baae2c7aee80d4ca32e98f9d07", [0x6, 0x7]}) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000040)=""/3) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) [ 1873.306071][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:29 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/ion\x00', 0x100000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x4970, 0x1, 0x88, &(0x7f0000ffe000/0x1000)=nil, 0x1}) sendmsg$kcm(r2, &(0x7f00000009c0)={&(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x2, @empty, 'ip6_vti0\x00'}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000000)="85ec9f379617b872c783054502650c6b44beffdd38f60f5e4a1ebbad34268f71aee3ea8987de57d6a4cf445bbc617b367cac", 0x32}, {&(0x7f0000000240)="41d203f369b322b54ec0b8991fba63522e8b20200cdb046e9bb15d37cfdc3602bd413b8376a42e5f3bdc4c8e046b26ff52c9d4ab5197c46f81b7ded41bdd9a905237b822052210dd09ec15bce66675f05eba702e", 0x54}, {&(0x7f0000000140)="2858fccc8e", 0x5}, {&(0x7f00000002c0)="9700016f6e4e067386664396d2d15eb1132d22bee1b3081ba6bafc201b36dc22a198f7e814992de6dbfc745ecafb686fa86b402dd805f0fd586ce218300b6ca658416a718e7ed5efc15d1b79fbfed8470422022c8095ca51ca427363780d067e4f1a21bbdca9a001ee1956e90e615470436a54aef5e2db509aaecadf81ba91998ef448a6c25d7df3c3a0c9c2344784c3d32b03a2b91c80f15904", 0x9a}, {&(0x7f0000000380)="a5b18d92b86678f552177e601ea19ab3f37c210102349384aaef298d986ee902925cb8cc3de840994e14de119193e4b4b177e344a56f26dbe3ad027684f3054b6fda5fd9ca3c66e082d796fee977bf01864e315210e8b8f16c2298922c38c4dd759db32caa6f5d7d246f47689edd0722d7a29a8a170fb91a5ae7733ed45731fdf8441cab501c06b3d4e6cfeca9161afb7079465f803232e7961302205b5cf142a699721035b984acdb78b37b64c3ed5ea0a003a971dc25eea5fd60d66b82defd2297672eeddd", 0xc6}, {&(0x7f0000000480)="a59482d974e7eb60b40816925501f9494338f337139147683448620243152d07b036850ec5f019808cce8221f37068b3af358dd00f1a34e7201c3f974c7eba86161d4f466f0823762baae75271f1f74cc89c266e950a22747432e7b8698e8bd739a7d48dcaf3d5a2caf2d085afb0c39e9416441dfcd7a3b48fb0d95304ba459791e22806f6a2e935f9613d30a0e03525dd94f7791ff46c2c18a3732414db21a58fd7e653e5d1e398", 0xa8}, {&(0x7f0000000540)="b8cb8f695929dee21afb15d6ff0ea457cb52932fbe8946af1b21e635681f446e7524c7584b985551a488ea36d80b0a989638553709a7f10b0d7119d7a81c8ad0cba6e8833de1a00b783152744a3a3703abe14a74f51984c71a0254af5bd3ab9551acbe7015c34c4e7ffa901ec78356a10d7a6a9b262f1e346796dd8dafd8ddb3a22f1c1b1d0509a36727f6fb8626e410ec9281ee3ea37193a8490b180d2f243f41c3cc1385d8e060c3a9e8152af57ac5080d4d9b984eb7b67c57a36b76e5b79d3b675f706727d3569f6c4bae673b58e7192b720d419257b70edf301e287862dbdd", 0xe1}], 0x7, &(0x7f0000000680)=[{0xa8, 0x1, 0x6, "c38b19a3a996334da33eb39814d3e7e84d1aa5a7b8998511ce1d6f553ce8643f50a42dcaf964de7d383a6f76feafc64de2524ac7f22d77ddc0ffcba2216c5510c8f80eabdb05492fe1963fc8648a7185095d1a804f2ac259a1391d44d14e8e755c48354028230cf384493ee97f542a17e5c44e1264fca55b6957591e4bff4df4787ffcb1575f9256e4b0f66599f500970ee2d6d43f6201af2850"}, {0x104, 0x12b, 0x100, "93d1816d675586969c89d056ec128126ec9e7adc1587472db0755e121cfed074b8195bbad4aa9549ca320b0d1a0a0696ded041efc90e9f0ca0bf47bae1519467209dace21b9086cc3a36bd7ada899326bc762028c62814183e44b7fa275bb044ede3d83157438a337245aade8a95a0e3fce9c9ac48a236485c1b34d20f364370bfb9a3aa3a48128a2e32212adc7abd0372947c576c4da26356fdbca64e8137c508bfe806c1440aa24e710529af8b102a26c3d9105ebdd0b68a287c822f5c71cf5231888d0315b5e666643d0101cf927c36d2676339fe565338bb3c90a1a594ba2ea218737a0481686c38e7f42178b0ab2bac36547f50d0"}, {0xb8, 0x11f, 0x3, "3181a0b2f3b4b855ab19d834dcf99fb9c9d1d0d38c7c3836877740706594de6936a3005b0ab0beda6ee5380568dab464c85ccd21d3198884a52dc6fd04a985a79b4fe47d72e9e9fd6cb26c2941140a118b0cf31f46aa0d5c78d2c92e09c972d24121486383f9bef46e351ccd449bdb4059b428ed0ab2ebd8313831b39f4604eb0eac2d14b8703a6ea6aa98920f431786f77ac687193b554e87fe96ca4c8a379d6ccadcb9d9999c0c58fd"}, {0xb8, 0x107, 0xfffffffffffffeff, "d245bf5ece6576722432a4b803a4ce243ac8e1829e6fa0ddcaeb79f4370b9108fa65ae10b47041dd62e9c5a3368a060482cf1d727b2e6eba94e75a9130644792cf26c2df8dc2ebfeb809c155d769bc27c839ecd00de2be782f3839a6dde9e733dcdb629f9e2273c679f3e3e0b695229fe034dce3e097c984e0deb72a1b7f57bc071e6dc5cae8fccd74aa65606baff7a759ea855556167696035e2cc271ce8fe010c5f50083ed97a869"}, {0x18, 0x11b, 0xffffffffffffffc1, "1e50b9fff296a776a0f8"}], 0x334}, 0x80) r3 = msgget(0x1, 0x244) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000080)=""/176) syz_open_dev$vbi(&(0x7f0000000a00)='/dev/vbi#\x00', 0x0, 0x2) 14:44:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x208002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:29 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x200, 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:29 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0x4) 14:44:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0xffffffff00000000]}}, 0x1c) geteuid() 14:44:29 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000400)=0xe8) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000440)={@rand_addr=0x7, @local, r3}, 0xc) socket$inet6_udp(0xa, 0x2, 0x0) [ 1873.602232][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:29 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000100)=0x1) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x4000000aeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:29 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="84473a19162ab794300f478e194a88b8a3e3a6bdd92f30430814c684bd7f26fa7d71f1705910290770a3ec9bf082bc01baa5ecedb0b004da609e7700"/72], 0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x6) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x10) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f00000000c0)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400) 14:44:29 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffbffc) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x2]}}, 0x1c) geteuid() 14:44:29 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x80000) 14:44:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000400)={&(0x7f0000000300)=[0x6, 0xffffffffffffffff, 0x10001, 0x3, 0x5, 0x0, 0x6], 0x7, 0x3, 0x7ef2, 0x6, 0x7ff, 0x5, {0x10000, 0x5, 0x3, 0x1, 0xffffffffffffff7f, 0xe81f459, 0x10000, 0xcab, 0x2f, 0x0, 0x2, 0xf8, 0x1, 0x400, "e354de81ed363d766e9670f0e92177d250ebd0d6e8e00bf6998f32ca0677874c"}}) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x2f, 0x0, @thr={&(0x7f0000000000)="4ebb3ba9864e543e8f263478e39817b530e63d1892733c6dc76dae14851860d482c6b7c86e0645eefeff4ce26a304e9d51acad546e7065fb30d23da00a7e2fbc0a4fc4b41147200693e554f2ca817c417445a2ff0f44b0b67b3a705dd7feec62f60b1a3a348c8ba49665d2ab076cf9775f75c74ce2d515145aa36a74cdd0977197b6289f532dd478dbafb6ffc9d89f8767dcd010525f", &(0x7f00000001c0)="6cb829aece62e4ffd45d126834982e3fab3fc468dd1ec5e31e8ffcd26e5a90f5212db767af5b0e75a65f8238f6a65c7f10f1187b9385a651049e054df807fff62a96c30927537c05688c5fb02247b8fcb4bc3fb37d114e44905783dc2865e90d56a0740447eada1a790bc68ee18e6689d1a271fa25c2de066385c01d0a429a3d98fd8d1c7deebe492229bbcc35994a809384e2fa6dcd6cdcb13204ae02ed3d5c37a78f292ca4fef616e29c96602b000803cb58022863e54b9c8aebe430652a0652a6890c12862492eb01dcf5c6691680ad121901c179853b629c6d799ffc23b5d0408af40cfb"}}, &(0x7f0000000100)) 14:44:30 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x6) 14:44:30 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRES32=r0], 0xfffffffffffffe25) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x3ff, 0x4000) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) connect$can_bcm(r1, &(0x7f00000000c0), 0x10) 14:44:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x101100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0205710, &(0x7f00000002c0)={0x1, 0x9, 0x7, 0x10001}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000300)={0x8000, 0x100000000}) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000200)=@isdn, &(0x7f0000000040)=0x80, 0x80000) syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0x6, 0x604c00) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0)=0xb41d, 0x4) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x3]}}, 0x1c) geteuid() 14:44:30 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/68, 0x44}], 0x2, 0x0, 0x0, 0x4008000}, 0x4) 14:44:30 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net\x00') ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, r1}) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:30 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000680)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x439, 0x8102) sendmmsg$alg(r2, &(0x7f00000011c0)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="6ef5503bcb8a2123c8b60ad0049350313430842fc198316295fb4cf22a0a74be8dfa2301b3abbb42a94cf99b46aae1fbcd1634b491a7e7db", 0x38}, {&(0x7f0000002580)="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", 0x1000}, {&(0x7f00000001c0)="fa757f41c239e84117000794e5d223389e7893c7321a29be977ada2158856745b48ab2439c982d86250e687ed46ca3e495f452ad0ef72a02135cffdf51ccec92d816fa02520edb72d47ae5b642dab4f06366614ffae95d9524126361ec90a955773fa4827513afcda0483a46ad779d35ce5dfd00d9e17ccd9b7893f260dff63590c7b66270e5140dcb82b4b78753e8ccc4b49aa9b3e770a42e3c18f818f10a7ec9c9650b15586573b37a3f15a9d003ffafd2d4661cf955ccd9d4056b675a3ae2ce3859e0468fff9bb0de6165218134af3a7025b4a910e9435d0f8ac5b2e403691a1ed3d7ee3bec7c1ea94b", 0xeb}, {&(0x7f0000000080)="1421200a0f900020f6d5ba4cf36e3257af3e1d8b73c358a85d6231be56bd57dd91eaafacdbac5f9cb636fadd9d0d90164ef098b5530e492aca0816e2b0c0ddb4e8b0f8a77ce94d3bc5e97afc289146f5a41409872eef8078cefd070cb200cf4104bc66e63700ffe3b974e67539e2ab74f88b5e38ff97e5445049a4f90acf540f8dd274ecba721ca99b167a5e01e3e3467a42edb87b8154893d53d2abfceee4536d7d137db49ca4fcff", 0xa9}, {&(0x7f0000000400)="ca71ccfcf966548cf6e726f21992d00fd09f32d652fe1e7fb58fe24f6d02bb59fdf49df5b82de0df445eedb68841de5f1e196c85e907021525641b7c59f6c216e8019e5872cc7435fa36079f0b2003148490a070a34fc2f3dfc8c6a1a2c9654d55bcef2ea0bc96a02f55700a3610df61573003e9f67aa80c7134121607d3f6f395b23b4f3e9d19452c135cb9415ba0c57d7fdb9f553d3c8bc2", 0x99}, {&(0x7f0000003580)="0e59d7e240ad7620aa878d9c651e78502f90d7bfe19f80707daf7fa3018c6cfc886172df6a46264a2dff32e627fa3ae824d075ed091eb4ceac9703f2ff32b10f03e7c47f1b6355bb55425d2630570b4a30c025e3dcd64f872b0f363f6689787f8c50b0d18a4dbad0e645930d8007ab7f6ed47bc4500c4c81ec5cccb6dbf1d183873ea53470bd30dc2bca3dc3022ba2911d0d4bf5a0ab6b3a2b878bdddf1e3f698424b972517ff963ba7acfb878964a308a257977ce6f55872436810edfae1d77443a5c1c0c9c82abef6d1827fef5202b145644a463ff8df22e508e6b064c4ec6d60fe5e4ccbf8a3eccc4b301edb8c312b1b8b25858b7346fff790e3ffad52445fc9f6b2b8b3063de096f5c0f63b08423b32d0323b117568b42ca919d2c653e6e26eaddcb2e14f72fae9b3af2675935ca5fba20c99cc124b834ddab0d938796f11f1ead12fa993503bf454d5600485c7c1719c9753ff8173d6c4dead90f7d92d033abbd4e7423cbf39c3597652fe702467d935d62d15a8fbf8d4d2bca0d80ea64f45549b5a6fc81450d4a95cc4dc13621cd2b37b004c4ccbdaea0b7f8361fd43da8976b4dd984f2e67d1840065e34a87cbd56cfb66036d266e0cdf884551c92493169bf44e89b6b4eed79c278f605a0370a144a2dbc3e72d5a90eeccdb7e0448e2ed0b0429800f445200e2fd3caf402d707b56f03fd39447345cfdad86608351d0974ce9a59f70fa73c73ae08750175306500b3efbc2ba0062ecc633bd7295127ec187a58e0a045f747d96ac1f29d70757f054b35fb31feedaa57a7ac277a703c9d55adb67bd71063564e23d820f040d74cc0e42b91d6398a40fbd00fa0377f6bd6effb0a22b519c1c5f9e94ff788cdc2610a6a9eeef49348a31bd898f19ce38aa8ef73c7a9f8a4bdbebf3353c447690f34694253d35bca2ddd103d94ffffd0390991aa5213598021ff0bc6e74f416905fece7a4823280b1df6b458a790d7b334cd6d275a041b07b9ab73da788b009c011dad2d0f50351c58aaba2f9e69c8892775af48baeaec1b9e9fe6d1eff85a72619b79c650ed043b20cdabec0ff1095d86fbc128c082f79cffee1588526eb039bf4382eb9d0aaf7e34ddbe828eb69378ba6bc21dbf8c3fd6907346f46130f855667e31bddd576d937348d645710d4164468565e917f4856fcab25d589464ea8c22f44fad066daf470fdc648d1dae44363d76b7eb6f5bf5b543fa9d0a34c0245a3298d912ad2179415b8c569616b536f6f4ac3fd599b2e52441e4dd0e40f227664344c9b80f88ceb1d99a6accc6da5b38882de27b3dec095f8a732a673edd5c7be852d307ea4b2a97ec6fe9e5d564e2119db0bb1dee6bef1ca7528d19878e921e31c82bcff9b594db9406d63ee8f9756490576762d40bd27a29a33f877d5f9fea5653ad5f4c7fb7a9c93e56df070ecd971bf907c69fd4dfeab8380db14a4399861addcb7889f7555d7ccde699dd6f01f96a2802c6d43876fd6cada036799357cb82ceb5f0d9feff147f9e6014ab42758683362e7355dd4cb3b38278a90f6510186cfcf468e75139f9b59a8c36bf9d99089596c3ea07fd7d5684838b6d031e24749c3e2aa7a89bfcfbe30f5dd8e25d124c474b1331f24d67718934f61889b425ab76f9f874d0cab0d3cf988b8a35ba62630498f27f34e799310727be42edb71b338448120e0d132693a085443a08755dc752d74edd2aa065ec5ce65939dd5d32a473a81b5a0be3fe38bfc32b260b23721cc6213bf278f259519a54392a032f628499fa99ba362fd6ff573ae0d4867d30d8f3e8fe0072a6ffd9a9d5053d2e4878d296ea7450eac7e0fde16c90b44122f7ce548804267ca4fe0e08f0a75f24de0b0317175512170954cea826dd3fa0411c7f4131176fdac6199eb36670500c05b5d722fdfc7f605a186c805e6e879b18c397142e24b5ebdeed38e7ca22dea56fd6594c188261f4b67cb134420519239697dedf5e5be933e7718c6f2a04bf08dbb278ca7808f18960e1dbb95f796726ca196c30dbe31068563a7b852df120ee1f4784585445f8ede42ea80d6cb5dbf032ed58aa3c34826902c9698e3d9078fa2dd090602be9fbffa3e1c078b37d6fee13542651b27eb40df108401c9dd16b19328ab5618fd94b7b46a432ec042100045e68ebb27c75d6a63f8f607382a21eb2e2f9182bc7efe84c9d3eec4893badba2115a1582520763bcdae3884f6f851842d34028977f57fedb10809215df2f905899439c5a7e79291ee9837e71e8ae5a9f3f2b73d2ee9164ef9270e3dc0a46775eda9dd0d02ac39b544045d1a58d10b8ca349fde74dfa6aeac413b6a05ce63004ea76940814edf56996ab3e85ed5797ead7b6119ac954f35e833fbf12bd03eb0027e6136aff9eb5ecfd513955d310988cc36e285682544ca61a150f0161164b0be8828dd1b1c3e4df66a3bb32b98d9b9fa14a78997d4e3dc1d66feac79ec1572d60c7917db735ddc4966156af56fcb062413bfcb1f49264f7ebec5d8d9a82706267b968e4d530f0e321477ab5aaa460eb71f92ed33c58a83eacdd32fe6b8bcaa940faa4bf079a41988b18a9ad3a1cc9739d4b5cebd9dad1246ba13a34b7b95913bb5f00749d271d0f134621ae64e0932c0bb1edc96f438af59f4e9dbb952bc34d8cf181f5bd1ef040bef6b19b8e24874c0d7ad34ba447bae63343d263d354151dbc202f36679052352aa50445bad2d87df5aaa8058d760f760ee385c0f3c1419c0cafaa24bc40529fc02d1af589b204bb5b7558433ab784cb8e84293f4cbb8a4a18fcdf7b38dda30a94eda38ba39f0091f94e174f69e7d3203721b70f531b2fd4f91f287e8f3be17c38ff36ed77dac1e4d88854490e365e63c2a42ceca6fd6f1d13d7ff0a703598fa5b93a4a05cac916266e00eee2934cfcf261bd851810863740a5783c296747f486b336616c7631b7d7659f0a77da75a4bd6972034d5111bbab8efb07803b51ba044ffb30401ce6afc3c56a5297231eed1695674e1e074f0e9128a6d0580ccbdfefe8555d5d5b706f17d1e843e64bb93ba149dcb4ad73bdea861bed2f87c2a7378947bd8d95c34d84251bea9972bd78e133d33c65248b3d862122f605ffd1017fe1e46daa44bd97b359ec3dcd91dd28f4bc6ce5aeb99e137f25538825aff747cd8cfdb9e721048483d9406d42d65a3b8672e5b9df061e393fb089d562c3d5f5169db75b7a456fb05f78b1ab9f1c3728a74abe801e3e152dae9cafbf343d7c4134bc50bf9f00d3f8a328b3c3e815eccdba31f6a9505c697b879e4e4b1c0a20e143662e14e91ef1c9804ce72e0f110d44645a8460af4e82e807c4517d7a7ed4b6be0ad2d46772195736ce6a591b50a78bd079c928d4d868220d2a5954b8a6a63151018e41c1f96516062e2415da96e390b5acc2183b151a06057ec11dd8bd8b6542ed2ce3af567a0af6bf3be9aacd34d5eef29cea08082b5489391623346ce48e691695ed23b42dbdfd4140ff8dfa38815b74cbc026fc00f26f83710b999f81e133e328869e900113d356d288436a2aa5aa01ca24f61d62565f45dc34d3bbdc7d8e30c22a158c34a618995b092d3a24cd5505d6136bb75a8970297354f764216125a91b6dd8ba5e60e366f133f2e0b6c8fa1cffe3b46bb9789a32f6aa7775f01c77090b2e64894d739b1c7fc341bb8853e4b6829e0a1bd0ee19123f6e1702cf2507f34df2372dfaa1369049950d5ee3baf3e94da19ed7480b28744e5b011eaa37308ab3132d9fa27e497b2b47364cf3a224b2bf1459d27f9c56aca6603f42ddd71669e32484b146d2de6a1ecc94b2322f22ab5f2f31006735b584ba436ae61feed93eedcd2b25eeda174fa469ba578bd1a5ff7de40b2b033c4f26e8105899c5177043c9281d826d6f09416bb5f2e558bd837dbfdc34114deb99ef43020f0612612ff2be57bab96ae77c7b3076a69134beb0616d284ea0cabac73b906009ff3ba3ae3a728057284e0ee25d6741e6d48c151d928fc92677cdde8637ef17e2e9278355f8d5e604b8f03c52dba03881d1b1768f5cc3eb3582c38c2324f1e28717b09ff09c11fde379cb2f67cbbdde8a4e2b766fc5746c314c5aa83ee54f7ed2899f187743a9eca172cfeb33dc373671edec646927330370971a291c98c74852562d360952c7a9324b9b00e83edab6714d8642319bc99372079a4e962fe7994a6869f13af57fc6a14b589e0320ded5931271f067a266c2a69347fc0571a35c0f6189dcd334403fdd71410a6a733cc2a63b2a7bc4335b053e388872eecb5e44737d4a9aaaaf606f33ae1b44aad5d8eecf43db0053ccdcc75fe60df421939e64e38b209dd4464e90dc7c5ec8fc073a1e5b4181961779fa987c581bbd92546801e067b5c0f946182d59288aa13458bf32810d8fd285201ccc03670f4f822e0f74f45e4e3fa75186d8776928dc267e2e1f1cabe406a4c7af7cb43e023c59db1fb442acb051208b334d2690ad3e0f2f19415e8852993476275d585aea691e2a87aeac610a636e7455978dbd0ab5459c5b0803daaa11ec8cf0d2c40239b41328adf1b841728e357f8e01c06ca8d1dee0c5f5f72e235cdb87961e9eea568112527be0f33e49a27a1bb694614811907831b9d9a80204ae8f92489a115d0d98b610d47c05841240e4a857e0b7850a66dd0d97f2f7a6ac6d4609df92709ae3d1c9651843d5ef32b43f409907ec4ec02543c5fc58bc6e5cc59d512b5abce0b8adeee41892b72059f2dae1a2181ae9c824fefd095be63924383eb8224c3ea7132390785acf38936ebec44477d6856e4f8bcbb2a4b606281cffa1147ad5784123f017b6df371f584e9340174707a5024ce599c11d0589cfc1cde3af545ac4f46e3375fe47fc2b860ba8920a5c2b1648973d45bf6209805ed799c0315f8b1a504a2ed9377ee220b4799baefe89d44b8f32a17fd1073840e4b8e153aaecbf4e1b15e6b62d5e977f97479aa0847438906dd68a5e4989edcedfa2b3caae1f272c7b712e293f790b30d5390d01563b7ae5ad5ef6d791c646c98bc644dbae3bcae851d3a196c5a6e15a6097e762c6d081ddc939e7f2a73aac5547df9a57a5033f9b344ac697e7220cb9464a2ff9dd9108cbfdeb22212ba7bfcde19c1e2636e6e050a35cb7ef5d427dd831d4cee89e2856fa5aebbef969672a121494c28aa10bd7bd9363701e6917874126c6f046f0a55751d6091ff751d43b78a1ef660c3bafc45fc0c0de3902c2fd6d3e90ba13fbdcae824f95a38b3531c809bb5991c9aed660932598196c54345767ce9e7feb4709d7f4422c70ad07569b8e04ba1e625d7b3e124ecc8c7d9f864ae4f035d96c87f7124ffb592416d06fbd20d2317b11c7e2cc937bd7f5b4e6f8364ed84211282046ace43731b7ca84487de6dbe72599f229007c1f61711e84827f873b19fcc46aaffb379022b1815bba9e107ebd736ef9e46e6c334a4b396d872dea9fea59b50e3a6487acc5c2f750c1ca0ebdf4dac24177a366d996a233f6a7ac43e02280c67e169d665b0a39c4864f3923859e1ad8c73198f1de2bb52311ac3c1945c8d40324a9f7257db9a6361bc2d3f69eec6342714a61380984f80410e48c5bd293c947af53caad28e5bfdc435da9379177ce7336481b569673251be6046a5c787a1ed540855ccfe2b063cc100a3a8084ce3f93661c8119183243278d3f76f3dd97fb35aa6520405f34664d9aa50f19a6be1988c1e1bc06be2ecf235ecc9b442c7bc3866df3f8142ab81cb417ef78942672034287ab60fd2e650bee4867683160", 0x1000}, {&(0x7f00000002c0)="23c6758fafc0e14225bdc364401d6da6b02afd164c77d9dfe0f3393657185df7e23174", 0x23}], 0x7, &(0x7f0000001280)=ANY=[@ANYBLOB="10000000170100000300000096772e05c40000001701000002000000b400000008d53566e0f9daee02715cf2a047cbf631febb5d50c4d06d33fa3c71380a25fe2f0148ffef39fca0ff6b68aa99ba6c00e1a8490e612ac51d5c5ebe0284f8df207a0663442c7044508e58277c1a41cee541d379165f232ca523abd0b16ef8f0b9ff2e90a46e0adfd41c1fc036da0b605f6d9b8c437542556c8f8211177ef13a04de7eacee547e406d552210c3cdbfe01842ef3253cfcde3984b614674143039bd6d5723382a95fbc8b817e243a436e56ec5e1013d6e681098134daa61d214657064100000001701000003000000000000001000000017010000030000000100000010000000170100000400888567724400009c0000003400000017010000020000002400000071e86e574733a55e4a4c5fa0a3299f131345e4f66deb7fd9f39e61d9c35c3b3e81c870a110000000170100000400000006000000"], 0x148, 0x8080}, {0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000007c0)="130b68d32924daafc4efb437728f8df9a92e509e7ad44e821a9d12b1a5734aee43cd886d65e85afe387cb235eff2b67ac4ad5206e968defd7f9012ea7dfcb90a7928562ddbf9c516b542ac75fe8be48ba8a26e52952eb46aeaf1f1333ca04f23363a0f1b9027b976dff0f5c55f9ccb5813929178b73716cbf6ff7844a45b6b58e3bb782638279f347d21a0f7797e3cbf2b5c47c53d2869d83ec0a9d98a", 0x9d}], 0x1, &(0x7f0000000880)=[@iv={0x60, 0x117, 0x2, 0x4d, "aab7857b9af576db1b3c3a7988248aabac8b5389b01cedc6c01ab2c6bacfa5c479d4085d80c6fb7ec17ca109bf834ed0bc9285f8b99d69cf1010357b23eedb167339c466ce78b8d56dc6a052bc"}, @op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10}, @op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10, 0x117, 0x4, 0x2}], 0xa0, 0x4000}, {0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000580)="872c5a9718d3c4efa8d0ec897f068ecfa153e1027faf7f49031d9feddab320a3441e9188aecf8ee83d947815af79df04cac0ad9992dc14cc08ecca5eeff341d1", 0x40}, {&(0x7f0000000940)="be2b39f2f7005609c2e63a9936f5235a6b631a4be4ccdf35adfd41c47d05054c8fe316c7a4", 0x25}, {&(0x7f0000000980)="5ad83c911eb78fa7b88015bb2ffb19430fc416f29e287907e170ae95a7e6be54d73c3e44233c673f438cad04ae04f967e3120cd1d0b732eb8aff91fa18a3813fe80a2bf71c7b65acb9e42d1e26cd9bdc3973fc95db0524e77095a1f60850eb50ffb3203d7588d57c739d3ba9d0bd9eddf3cec784354f2aa37282d3269bf10003c2690ad4ba17aa1d9af21da0a376662a9a703a2634a943c807bc3b656598e244e9134c4080fecb9fb7669ef17133cc42d5f7d64dc175009d2e622052a9e81630e5d2d1210b231e112fea8893ea247b154185512c791e55b64b5c0cd4843e969518fc03ffa9a46bd9006def29a72f72e597bb8f69e9d570f8", 0xf8}, {&(0x7f0000000a80)="b85d957152809c400f4cea6beda68d1b9279daaf56afd49de9e424a0f886b600a6ce1a7915fc1a3e3e49cc0372cdf725f1421de54a3863e5e1b376d295f3ae769ff6e2419ab7064846e0eb4859a401df81f0de021d0a411ebd8895329dc385da2d966a71f7489256b80e023e4b86a413c29600c9698cbfde7d843ac6fee5", 0x7e}, {&(0x7f0000000b00)="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", 0xfb}], 0x5, &(0x7f0000000c40)=[@assoc={0x10, 0x117, 0x4, 0x81}, @assoc={0x10, 0x117, 0x4, 0xff}, @op={0x10}, @op={0x10}, @op={0x10, 0x117, 0x3, 0x1}, @op={0x10, 0x117, 0x3, 0x1}, @iv={0x54, 0x117, 0x2, 0x42, "a910e5135be2d56835d80240ca8bede91ce40f95ede2c77e8b87cf7715376de60c22e6b904edd219d4c55e5f38d0857d1b028ed82047d82277ca281a70208d7665bb"}, @op={0x10}], 0xc4, 0x40000}, {0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000d40)="763f4342e2f6c75dc90b8bdddf08bc9657435f425175b56990c4a3129ebaf1f33ceb0bd40bdae4d598ab15afd1ab1a31fe55c807717cacde240806284a22944a57552dbf0a5b1d9697374e0a4450fdd408ef05b3ebd6f22f8d30914b647ebe63c0dce5f047ce7a2a77c657f0dc29998bd70817b1b7d3dd65584c425df2a986319330b7611610c3a11e7f0e24a2c5aa9bfa9dcdc2e3fad717e0257cd88f9f8c048badb6788b816eb80132476c41e6c831e4bf5c19b25f6e938d31f76ff0a101576366ca3e", 0xc4}], 0x1, &(0x7f0000000e80), 0x0, 0x40000}, {0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000ec0)="5de2a6f71e235a1c91f68a158b513804d415ea6b47e8e49f50c9ce6c7d0de8cce32e3750fa093ef62ebf22242ef76297bbad22f6cc5ecfb7bca393f794c80ac89c05552af2bf2f1c50e000f0b2f26355652ef2539cd3a10c266d98842556a078e9d9ee4f4082d0dee1b170d32c5e892ebddba37bbbdf13e69b6be493b3d69e5fae59f0f45a80abe8c3", 0x89}, {&(0x7f0000000f80)="12ddc85cffb24c75dbb2eec7c5616d01096760e45bad1fe822a7ba46d3973e82d2253c57cc47bc5b812dab6f53825d1c4fafb7af", 0x34}, {&(0x7f0000000fc0)="e55b33509b256bea2dc9087aca9af7091ecbb4a598dd02fc1715ff37d0ff00a7848d49c97b7cb25c9e1d85307ec1fcab0b42508a9c", 0x35}, {&(0x7f0000001000)}, {&(0x7f0000001040)="4d98482aa0dbe27b2ea0af21c62caf4ecbb5e8e1d8867f28431551ccb1336adff2dfd0d817a457c1f26e33a153cfb88e3785465f5ca155c49beda6355010a8250ea83ffd5732", 0x46}], 0x5, &(0x7f0000001100)=[@iv={0x38, 0x117, 0x2, 0x25, "d86cf9d59296b686213a3988ad11e4ce6b87bf2a089ac34b3a153956d88fdf3f425ee3848e"}, @assoc={0x10, 0x117, 0x4, 0x501}, @op={0x10}, @assoc={0x10, 0x117, 0x4, 0xb0ec}, @assoc={0x10, 0x117, 0x4, 0x5}, @iv={0x2c, 0x117, 0x2, 0x1b, "868b1e63d6ed9d33d6514809b1cf47b9131a9a5eb442118ec65068"}, @op={0x10}], 0xb4, 0x800}], 0x5, 0x4) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:30 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000580)={'bridge_slave_0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @remote, @empty}, &(0x7f0000000600)=0xc) clock_gettime(0x0, &(0x7f0000002380)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002300)=[{{&(0x7f0000000640)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000700)=[{&(0x7f00000006c0)=""/21, 0x15}], 0x1, &(0x7f0000000740)=""/88, 0x58}, 0x2}, {{&(0x7f00000007c0)=@nfc, 0x80, &(0x7f0000001840)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}, {{&(0x7f0000001880)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001900)=""/121, 0x79}, {&(0x7f0000001980)=""/249, 0xf9}, {&(0x7f0000001a80)=""/109, 0x6d}, {&(0x7f0000001b00)=""/212, 0xd4}, {&(0x7f0000001c00)=""/153, 0x99}, {&(0x7f0000001cc0)=""/200, 0xc8}, {&(0x7f0000001dc0)=""/38, 0x26}], 0x7, &(0x7f0000001e40)=""/82, 0x52}, 0x5}, {{&(0x7f0000001ec0)=@ethernet, 0x80, &(0x7f0000002280)=[{&(0x7f0000001f40)=""/248, 0xf8}, {&(0x7f0000002040)=""/230, 0xe6}, {&(0x7f0000002140)=""/169, 0xa9}, {&(0x7f0000002200)=""/36, 0x24}, {&(0x7f0000002240)}], 0x5, &(0x7f00000022c0)=""/48, 0x30}, 0x3}], 0x4, 0x40, &(0x7f00000023c0)={r9, r10+10000000}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002440)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002480)={'vcan0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f00000024c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002500)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002540)={0x11, 0x0, 0x0}, &(0x7f0000002580)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000025c0)={'vcan0\x00', 0x0}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002700)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002740)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000002840)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002880)={{{@in6, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000002980)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000029c0)={@multicast1, @local, 0x0}, &(0x7f0000002a00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000002a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002a80)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002f40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002f00)={&(0x7f0000002ac0)={0x404, r2, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf8, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r6}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff000}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0x140, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x7c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r17}, {0x4}}, {{0x8, 0x1, r18}, {0xc4, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe8b}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r21}}}]}}]}, 0x404}, 0x1, 0x0, 0x0, 0x10}, 0x8004) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x4]}}, 0x1c) geteuid() 14:44:30 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KDDISABIO(r1, 0x4b37) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000100)) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000080)={0x200, 0x40, 0xdf16, 0x6, 0x7, 0x7, 0x7ff, 0x9, 0x800, 0x8001, 0x8707}, 0xb) dup3(r0, r2, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000001c0)=0x4bd, 0x4) [ 1874.364970][T23398] QAT: Invalid ioctl 14:44:30 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x0, 0x2, 0x1, r1}) 14:44:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x5]}}, 0x1c) geteuid() 14:44:30 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x581143, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, r1}) r3 = dup3(r0, r2, 0x0) syz_open_pts(r3, 0x200000) 14:44:31 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x800, 0x2000) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040), &(0x7f00000000c0)=0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x98000, 0x0) getdents(r1, 0x0, 0x0) 14:44:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_settime(0x0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:31 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x4, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80206433, &(0x7f0000000180)=""/92) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x40) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000040)={0x0, 0x6, 0x5, 0x10000}) getsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000100)={@multicast2}, &(0x7f0000000140)=0x8) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:31 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x578, 0x101100) ioctl$VIDIOC_ENUMINPUT(r2, 0xc04c561a, &(0x7f0000000080)={0x3, "e65b9e5ab9c740b1797fa55e5f52e82c3f892886c6e6e36f38063c62a76c2eb8", 0x3, 0x9, 0x7, 0x800, 0x10, 0x8}) dup3(r0, r1, 0x0) 14:44:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x6]}}, 0x1c) geteuid() 14:44:31 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x80) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000240)={0x2, 0x8}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000003c0), &(0x7f0000000380)=0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) getdents(r2, &(0x7f0000000140)=""/100, 0x64) 14:44:31 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r1 = getpid() perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x4, 0x1000, 0x4, 0x4, 0x0, 0x200, 0x200, 0x8, 0x0, 0x181, 0x3, 0x8, 0x80, 0x3277, 0x1, 0x5, 0x4, 0xadfb, 0x200, 0xfd, 0xfffffffffffffffd, 0x800, 0x1800, 0x0, 0x3f, 0xfff, 0x4, 0x7, 0x2, 0xd3, 0xf06, 0xcb5, 0x7, 0x1, 0xc142, 0x3, 0x0, 0x8a5, 0x4, @perf_config_ext={0x2, 0x80000001}, 0x4000, 0x0, 0x8, 0x7, 0x4, 0x6, 0xcf09}, r1, 0x3, 0xffffffffffffff9c, 0x1) dup3(r0, r0, 0x0) 14:44:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x7]}}, 0x1c) geteuid() 14:44:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x11) mount(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x20000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) getdents(r0, 0x0, 0xffffffffffffff29) 14:44:31 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1, 0x480) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000100)=0x4) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000001c0)={0x0, @bt={0x1, 0x1ff, 0x0, 0x1, 0x2, 0xfffffffffffffff7, 0x0, 0x6, 0xfffffffffffffe00, 0x1, 0x7, 0x10000, 0x10000, 0x6, 0x2, 0x8}}) 14:44:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f0000000000)={{}, {0x0, 0x989680}}, &(0x7f0000000040)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:31 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400c80, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:31 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000000)={0xffffffffffffff04, 0x4e86, [0x0, 0x9, 0x3, 0x3, 0x2], 0x8001}) 14:44:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x8]}}, 0x1c) geteuid() 14:44:31 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x10000) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:31 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x1, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f00000003c0)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) r3 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x1c, 0x80800) fcntl$getownex(r3, 0x10, &(0x7f0000000440)={0x0, 0x0}) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000340)={r4, r5, r6}, 0xc) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000400)) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:31 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000000)) r1 = memfd_create(&(0x7f00000001c0)='#! ', 0x3) socket$inet6_udplite(0xa, 0x2, 0x88) pivot_root(&(0x7f0000000400)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10100}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="000000004cb632e53bebd64fe1e20f1f1bf9832827c97ac176be0f27292043257be5d65373af83a12cfb", @ANYRES16=r2, @ANYBLOB="200f27bd7000ffdbdf2502000000080005000100000008000500050000001800040000010000010000806cda00000010000008000000080003000200000014000100000000000000000000000000000000010c000400ff070000c40000000800020073b20000"], 0x6c}, 0x1, 0x0, 0x0, 0x4040811}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB=')WZ\t'], 0x4) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) execveat(r1, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000140)={r3, 0x2}) 14:44:31 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x200000, 0x0) r1 = socket$netlink(0x10, 0x3, 0xc) sendmmsg(r1, &(0x7f0000003100)=[{{&(0x7f0000000100)=@can, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)="76dd91621030559624251cbf091a621ded5f20e7f0ab446eb92299610ec582fa86934d4b893980675feb77a3f1085302dc746a7d3b8aa091050cc60f84ecbf1237bd8baf72dcfb3fbb2a83a4ae2f30822182f118276c6204637f5f2f23c082638b268b86da4a0a8d79eadb0b896da0246b57da578af1145d162f6509f464da035e0d9618b588de11febda187", 0x8c}, {&(0x7f0000000280)="b106d6f19a2ddc12670bc29fd4142bb711e9194ac60896412e34399a3fb905672cdadf5a375df43e44075fcf4dbda8d7a5d0fbce6b6e05d0fed5acdf95db4c5b3d4276f111348e1abec83226e3ccbc5bc80f9a989d3ed5e3bcc8cb9306771f11789be3fafd7b", 0x66}], 0x2, &(0x7f0000000340)=[{0xc0, 0x10a, 0x10000, "13ddcb46ac33c6b1a44a2bac4a422ae9c7902e85761c7ed405818bf1924d27e0da74c209cf454862bda78ea0224b1f6fc80ae1764cd01db862df4a7f3e9bf29709f9c44343c15205310360c65bad6dea2f0aa3fa396faeba52f5db3d4ccaedbb22ecd896eb387914fb61c7ff58a3bc535dc05f7aa95d3dbc94a2822c02282a046957f641323dc91e7158f797762918b6f54f83b5091bf5f9be55a9e57e994d482e9cf84c5f28a9fbdf58ba051476a4296eae"}, {0x18, 0x0, 0x40, "83f1ae6051a5695edbb3"}], 0xd8}, 0x200}, {{&(0x7f0000000440)=@isdn={0x22, 0x5b0, 0x4947, 0x6, 0x7f}, 0x80, &(0x7f0000001980)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="162b2bb171e4a8fb6b39be568c663db7c385683a8bac13213ac5861bc2a8797fdfa888a6cbcfbf3cfdfcfc2f01bc1f5e76b728da3e3404787839bf06426fdc8f831688bd1ee30be1566b18e9715df0e82e85021ce54847fef4803cdd8bd21734e9ab9ca7348c81f371e9ac6e8dcfd4b45b72508d0668adaafcb7cd2b01f55bc1d952b5d5106f3b9086a1c82d048986e9b416f16eca97f46a4e4ebbc6839dbdb37d55679f3ac5ea091c14ccfebba29d8d29b7532601a7da9fa2", 0xb9}, {&(0x7f0000001580)="511aaca3e1e9fa434f36ac377b2d5f0336b2f57820570faf705d61279b1efab6bd48fe590494920622b649f00f4527a3859f91b135b222dea09cb78a78b918f83209b2b13132eeb67dafd606a5e48a5f107cb0bcd9ef4d426e8fb4890cd1c85fc0516eb75ac46afa71ad57e039b2662884bf97301265b92d9843c189f9f333e16641a9740ab54efb243ac181a76956775d633b38322debbb5d25793f61afd5cc0967385883309cd46d2cc8abe8e789446bd62040eda4c4a4fc4367", 0xbb}, {&(0x7f0000001640)="ac5d378b0e2b6ddf", 0x8}, {&(0x7f0000001680)="8a8a67", 0x3}, {&(0x7f00000016c0)="4a4ef45ae00a09e645bb52e6d9e6db54c9ce46fc796630626bb29444d0de99fad12528521547fe3ce9521adb87ec1aa39504d389f7", 0x35}, {&(0x7f0000001700)="b27c24cd8d073de6aad04093ebba0f0266148df2a60aa1f50fe4c83cd69d1d7960e40ac586fc100cdf979d99bc714e6395ee9693df56841b655d2e9ed7ac0f2466b8b1174d41e77bc56ab0dd4db97f586f39d79dfe71fe9e2d563c9d93fefa005f3456d6bb94fd63e804d76b393d37de0800ce64c39aaa8e00056fea185ba69c6f1d1819f68a2dce9dac919f61ff919c3c6ec3a438e8d9f6be57931c51635dde5da00521e57820066233471ffcddec6b2880804d03706e034bede555ffe8764b8f74bb7f647b4337ae1a57ea84e295b94c5c070202a0936978ba2b83dd", 0xdd}, {&(0x7f0000001800)="0528c6333d45fec4c626bf2f2aff684c48b3fa9238501b7785a33c5c3cc1e4a57175d30e4d7098893164d887e569db36e31b2aceca45d468e79f2c016d3d70e413d64f1d7947d3cffa996ab1f1ec8f8c44f7d97514d5b7d68f7c54501612d9ee9d5bd99fb0f32283d707fabcc88f0035260d9350ba786aa2cddf1754be36b4c3a7a6e50e192bd102d5e04cb5beea0ea971bd967e72da8fb4213103316fcecf3d00be49be7308c24d13a0972020ca7e853c0cd4a392afa32501a65f43d094ed471aec44ca4a1d72", 0xc7}, {&(0x7f0000001900)="0850f640b1a04ded548f2db74180c7b3a2ff79c048e6dcd6d76187b5d697870a84166865a2a4e3d335457958ae249eefc4cbf4393190de861d89aa", 0x3b}, {&(0x7f0000001940)="c6dbf563b50be24f252aa2", 0xb}], 0xa, &(0x7f0000001a00)=[{0xa8, 0x116, 0x8, "3dba757ca57b20da60e25bc47d4ae08588a2b4dc5254561df6c1bd7204f5c477033a6ea591a32d7b1fb7dbfa0c0b7624b5a065bc2904549c9c9d4095e417214ffa3ed93baa54aecf88fcb8cf6a97154fc241b836608bca97b787ab91f247716cb3b24adb2157f85e15730d73020ecd391bd734988c19ba21e1e69d1d2253db646e8e7b821d7a83e66f4cbecabfa3be32652c96522815f82427ab42"}, {0x90, 0x11b, 0x3e3c, "adfd4fec5d81f289433c49bca09043d99b4ef04111d4a3c310242b1a2a849f1edb3cb09e50e7aa3a9bfb3144d79cf6f59d710e0212c1fced2cd0a6264cd1308e25ca86d66effa22b56728462b6635af747c713e940f02b4b877fb6f37cfe164c5bf59fc5c4bd3bc37f15e923254dc8b1c366c12b15fd5e3441cd988dcb1018a7f6e78a7e"}], 0x138}, 0x83}, {{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000001b40)="d8039f3e29de6699fa6f031962c35d70c0e4806e97ae386b74fb6f25542c39140b2b7cbac03815c684d12454c81c6032765b22a850cedc19a5672c6046b49f0ee0407fb24cf1265211d3ed891b7a504f0e0fe268a96667f097f2325976eba00ee1d27cadd0c00536021b387bfc2fa6fe07fece6515f1d13ede9b501cf848a70642e4b11293046700a26f0d4b9181dcf997865c9ab2ce6b2236eab3e03b5b87d08eaa0bee9f0f3069aea4be7f577833171567ef933e1e969f80db73cc27f230735fb9b8cef05a446d7574e4be69f16baaed8878b3372d44ba793fc036bb2fa015c51b3e86a29a959d4a35ec80ab30d2de192908650fe833a3ae997bbc2cbbd4e49b30181b5d4b7dcb1c1429415ececf4614e3e5ef6354806c2fe789cee88f2374231a80bd290c2bdee795d5cf08b0f0b75fecb1055d7515681bdaee1a16858e65283bd326e2bf746dbcd3e24b1821afac1a57643453b2ae5057666f8a275c103566305edda682a1124545c2bb562ebb0aa6f6213eee88f665c2cdb2f003a7c09846796b81175fcdf296d6f9659005bbaa14101dcce9c89cf31a5d91ee312f9fff4c73ebcb282e51889db9d0222cfa2647734cdc701a3661597ea6c9e52a9ab8a2e44556d3d22c41b984fa06dc5cd977de70aea5154fe3e488a9bf30854eadca07f9deca8988daf154dfa459ebbb5a4e7c5176ba8e6d4cd430987b79c41da2256f4f282b1a270bd65f7355c0c78d5c4af9af2207871bff77d43da177dfa4b8c6170d28cd25df8ea008ece5db06ccfedc7e6ac2e0447b65cfabf4d0b9fb1dd062b41d2118c602bbaa5735b368ba2b2e2c854cb2ba978624311d9ff26ad625fa8087afba958e12b94ca8bf5a7fd14d84cdd019e79ff68cdfee160eb46a17e79043c63622b1e277044f7b37e6217b0c63da37f36921bc50f3787259c2373f1a30149ceb93c36abe101aaec607e7ac69827ead0f2edb9431901fe87bcf13460ecd08071aeffaad30206c6375b622c514d199bfa1b3aa6bc5a36b2054d417ff2404dfb9c222c13919b6e387f7b70ac2072ba6618e56787c58f3fd273f93859546422adc265d65599e9db683d557fbd13c51b93bd73ebc6a38beab563be721e7babed0a9b367f0f8e1606ced48225fe1d11063b49f86db045224491947ac1b96366d14a29aa84982de110219e0e051642bf0af7cde268627ae365e58f0b16f9476ff13c8b565ce17e304f04d31c934c8a5f541956a95a9f8e293267b904928686170f9f0eb99a5c802b7bed5abe38373c8d847a2b3e7280e588c6c6a56260138009ac80272c78f037cc56034463c0e4f61c9dc2ef34fc8161d6c60711536910f097ab7e5de6d0c8216d3a2642e3d8b6974c9d7affe3b2ee93527862f3027a6256dd569df380d34c1cb929501f64d39a704e0aef4cae0efab01b6a9fee488a63bf1a62af3d57921a0aba97c9ae00fb6b18f6c8a9e2902ce808f00f7352a9e3c266bf4f49e812e128e977a77305042c37ec1319c4057597d40dbc6e816ac78a8ad8e9c185d92691063df447928bea098d6f184e966185437b6cfb3429a9559a56e06515ffea40940ae338596d2aeb179fdf1c0f9c3eabcecea175ad82defa9a8d9816b0c4ebd37ba8887829b12606c4ff5663def64b3ccde212dd262b2a564dfa1432a8c64c3cbad2ac902e3a21dbee12c662d1f15b52d5f1527ade20027b012344ae1508ce889dedbd06a1520cc9508df94d64bd1cd7d64986104e9b019995573f9b8900ed2af1ea6ed84a3bd1652a3b388470c5d4859c985b54405efc42e8d54d7197c99888e4badbb1b657006cc3510bd70543a21b00d5331ca92f76af456c47f9874a48e23b0ffa0fc646cec4c6351f704b496512b9ad731029bcb046841e883a0eb5f63189297f7bf4ddfcdb63bafd935fda6b30ae66856dc6bb8bb4336df191c610fc37daed554863717f2912be1c0c08c373d6074796cdedbd1bad09934bbc169ac2adbb4ce4a844720504e8a7aeae41facd4993c0dadd09ce2bf7c0386637adf8a0cfc4fbd322fec4393f7c90a91f2a66a8a4af35c61285bd4548d53572c7af6d57a8444421a17fa14c95c79b7298b77bb219282c06ef7e5a669f4fd69508dc7376b7245664f20da95949c0c1d4b405a43f5fabe76325aeff9e4178aa44d514a7f24d75d454a15784b2bd37dee1db4476fe951a5691a1c8d7aa797db3e8a755632a82d322426d32fc035f55dcb8e564872e0bd0ce526262b94949371d12661e4eda386ed6569c70492193e0f46c83295b64052c3934da1bd316873f12c560329d31fd5ab9211d3774cc871f5c54ba4ba8a1291fd3dd54bbb61b52eb796d6b45e0d654fee0cf4e40e2c147e4f5a665802c105a81c9094329af399f9fc19160241b215e4fc1b5126f95a835853f40b4ce0f8df44b21f7075ca829d3866cf5bf1f14a74cbf926e1f8fb0985ce8a4517253de092676f5b9cf245e9bd7235fa2336da35f3db1a0943090a4612b8ea63a63ff27a0349947339b2d280fa733e5047d8a51e0fa325887816fc0cb8c544f1d16d6600ac84ed85f32d15a0fb3e07c8d06e4030f9c82c75d3303c590faf776f15d64623af0cc594290f8448598a6957831f651b21fe63f96ac9e441e73746fa1933be2c476d0ba2a96fb6c9c0a692e75f44cc1d458bff7fafb211c3fe9d84af9daa3e4a832d28dc5ca3cae1401e36745ec04949adc3909e3a39b7a7ad1980ae9b8b4aaf390027200e90b013945566d2fb52b865da973f134fe11268a9d5a8d54f14a8f5bdfc4d53f7bddfb49eb9376d106c5ca4758d1907a5a88cbc13c81a268fe8282fabe9456605bdcab5d91f03460681d168bc4735b9dfe313963848ec20de43e2afce2fe9c8dadfeccac3153f4dde86c9ff765206c7a325f56577c37ecf43ee43306902ff87b0d4eb519a0b1d706cc743e184f0c6079ded41defc74f53154472961c27b889b6db8d6a64e0d18c7fddc0db296f57315b403a419e566a8b498de625a15e07496545ac3c95972db944c63b2e304a4b355b822bae29c3e95b09ca7b4b66eeaf4199c3c2db85bd9dc0e24f3dce678b5514eb08c6400d79ee9c4cba6322906baa9b7c565ce4b3b1feaa70f7f78ee35276691e71322c952a49c2f049009f8b79e2b8cb40c137adc9b01ffd978e7c8ca688e5e266e0aa726937f8311cbf76f3673cbef52610942ebca5ff0dbeef68e7e99f53a4a14e9de342879699f0843d710d8d7c9ec7ad7ad8f3561022220f5f894cb4a3aeed3396f22160a4a9abf7ea9432971773c6ea7939ddd93d9c03438b8fc6328e07facdd711f24513595a9a8d648f34c63fae3d7ff50326e19682e7d1d3ddd85cca577ffe95f3970bf06ef5710fb2a69acc886839f8d23b6f08d3dfc72fd3b68edac51677b8e9e64ac01b2635f67f22aa683cec2b621a306651edcd7ad7e9b5fc84ad9963d67d248f1e56b178cf23e4a7a5e35d4be8b40f56de430c1542869b31381a9a7b683811a04daceacc05b41ca0f009edce270e58cfb73d0ae4e83b71eda3fc6d01118604a9fa917c36af5f245eb02f1504bc55c08dd435a14a432c71105290a08b75c6c79fa7b269e2f8fa6b904cafa287e349bfb74bc576e1d6f4fec27abffe28082380ab017cb15b2f5e11e42f8cd87d82959831ab6f764f4365d30171fc92abb5bb70322c2e963e3a142c92e9e4962b790226b57b66712651e7ead2c470e7910473d524d5c4ade4c4c26a55fab9141c2ff9e874f45d0eece6302f20cd1beecfa620bf2f9ded16e6674fdc319c197a20187ab0ed0744594e84f2dfac794c4adbf2a17d55bad483e9a290736cd80207fe54a809946cdf21dae816554fe7d034eb92433f58d4b478bd7349cff076e447201285e1566678db2b1640f978232ba817820059528a328871c3878d1ba176d7f2bebf46f6e9286fd3c204641f57767f128e9af21d48375831a5edb7fd66bf85644d74713897af414d457f537a117ecc47a22d0ca0005c54f25bc9adca033be7abe1c8437e428fe93df1b844045b00374ae6ba9dc95e5ad679a67014c8378290c1685bba8de11b878e27d967d1342872896e0098c0a60f93f233ef6479aa61ebb0845a940756d5243721797619432e50164d909e8210fc37932f7d5792e7a795189d7f5e5b32e16896ac99dde42c59f09c226d8e1a47a1d1bdcdc9c91f4aa6cc4fef299303d8a2a657b77aed3db44800ade1ebb3fa035240318d9ea111c8501a2dcdddb2383cb47b989139c8aac58d5c0019f8d0b1719cbec19a48eb51a51f570a21c276ab3047bd605b898401b93adaae7fd33e554daaa12f07a6ac19f2b4c257c69df1c050545caab8412ef008012aed9c5f24bee5827b4701521053740f4cf345fafcc3ed1b314d3dcda741c6703d0921e6623e0fbec6988d1616f4236014e3a0b74861feffa529a627906768e81e06982ffb52404afe80788379a470e6a055c31dc7e4861cf17ae722a1df29a889f3d40505957418205395336d95a61babd2bbd5c239e1973b7af8f28ec98f8a534ad41db18a79d92fa2aad92cb7c8c285799e59130970c8c823a5a8ac8d803237c0b3b45e78c886876b1a11d0e7e6d8643097da50b847024f2661acbf7e3da71fc04e7d0d5015439ae2d87d6b54c44fbd647adae5d805dadb43c479e564adffeb49bb9f18317fb4215ff0cee65c13c1393f567977ab346f7589455cf693fa279054ab05e6d674d901cff48841a5e45f313d737db58b37c0ad9197faca437f2c16df03af5d76f6658d04c4cad948c89e72fbb868dd5b667f92889cf1256e7aa282937e92c480a957315b176e150716ee4c5b8b09689301919833ffcc0d9b234d3e5282dfcdc830eb1f4d3484fcb50b11446bbc278348255d46120bd937b8a5dd66829d49af1094c810e1fb1dbac64c204bbba68eaba295f157478c12aa60e04b4be38a2719c91914bafc030a2256ef6be2cc1b57bba54dfcbdb8d4903b141646eea1c1365c71a48ea56ea3b94f9715d2cfbd3facd830318dda477ca65187beb4dbdfc1f8e52d89d798a91d8d89300b6a3fca735e92e0d4261be8daedfcaaa4246f2b1b1a637b0d84910317e67ecef404455e326d4e238af061a2f9bd330733305f4b36443f3727e69247da835c6f52c63638918a4a8dceb3c5d88e58cc8283a34ce2def6be1af6079e9a2f490b28233d0a5921706324d4f601f99c466e1d1841cbe8baafc85e158cd89986001f719a6040844d7f93aad362284d1adbd6c335481a66521e5592f6ebf5d33812dd6b28bab11739d5abae1039f1b7099b8513ae5a26d3eb91e0ebed8481cfdb05c72b5790911f01421bafd60a8f922eb4d95bff795fc6d110ed3fcd6e4052ec4225d13fc2199a8793704e08e009ae513272df21692d93daf127420951308520a96e2a5a343e6a38e50265f6420b3e41ba1b0962433af38ec1c76b675b8135faabd5e373085506f56bc2ba8d4cbb02bfc754bc6613c493db3fbd636725d33a105511f756e0a4da261c2c3501f33a56b1bfe80a6f4e1fe1d7b9bbca41f003c6a764b4e053ccd2a36c4691f28a6b90d3f725ecf54fb391b55f1846d7fde6c5f681edec427c498f4f66603af01eb31e709450439eadb13f44239af69a005076fd07f4249f51a843d2cf3f69cc02996482d46d81481dab5e3fba0e665505418509251ea2ac01faa5b1ed4424f28d75b8719bd890ea6885e323eecf0a5c9af557b4272b69e46d33e51bee5469129d03804c3c23facbaea654b6e436b4051629c1f4bc1c08ceff6d24c4228693bd4360a8cc9", 0x1000}, {&(0x7f0000002b40)="e65a627b89152ae1b7aa14e0e3874110a75450f564b4a770558250465c625cfec3a61ba163d51dd773922bb6ebbff6e7a8f35d10430a37ffef1417d5fe071ecd0ac22c066c30b39a61c9aac47e44affe3649f1883407a9a8fe06dd8dea4a40f5904b2e7edbddfb19f772b7ea8ca65e4e0f99511c412ad3bc1d86f99bfb3b4f51f72db94b593959752e6a0fae8f3e0cfa654d3f9d0ce7e28b54dc628f545d486b842ae8b12c", 0xa5}, {&(0x7f0000002c00)="fd3912393dbdf85a47517f47fa01d334b4b074b214f833bbaedddd35051b5924a7f661f4e71ab5a3b5ab90a30a38269edbeb33262900dee9f3c87aa372a43e7600e82e6c86f099f13865fbd9e9c8fd4c44f07e0db90413fa7192641006603728141c52073c25ee661ef06b5290aacf284160a437cb301c00073d51be077387a34739887f0a7ec06ffbe540c41a9bd9fe65732c11c913ece8fe3acd9bbf567f5895021d69e095", 0xa6}, {&(0x7f0000002cc0)="4ea9cf95bc5713ff817c8ee020f5452369f92975507d601eb7193d38a8a97826169c9ed59708a3eec322e2e702f125af4ce28fd03d000a2f7bba9ba14c5ac4c0027a5bac1cfdaa9562107bc98ebeb2ee474c5c18a8a387aa5519cd059fac4da751541f7695b8fd4db64751ac9c8d4d56", 0x70}, {&(0x7f0000002d40)="397e6f5313200fdcd0f3bd5b8046d1d39c08ca5a0fd8dd6a39ec539f7ec99fd3ddbaa2c7a3e35b04a66b4ad4037705a6966940ff9f97315cb25f041acced48f77acf2d4ea15d40105ea32ed31a1ced83e549af5f0070a46cc5c63495ef7c23aa3f814f99d797dce7a982cf63d4458e0fa44d05b074803e4b424a2b7a5a6030ae0785db2a61029378d2899fdcdfd0870fc32992548e9f8fe6e6913acf1ed2ca32e4c09e0ebd1361601621309c9a745e5dde1cc1d3e36ffe75a094a76c1e42b7ff73f36e7c3619790ea1dde99a180d5c269a073def1f", 0xd5}, {&(0x7f0000002e40)="a2c0196586ed08e68c60b65e733f268ec0788df5fcdfd08063c251a28d88e2041746953d99d6cf2ffc71afb07004a1d3f80aea9de6a89dae000d3b8dd90cbc0a171f45b5883a922b0cf67df9c51f866da945e6b9edbd66acbabf45f7a30672b061eed6ceffec29323f6b103e39b2d16e19abba4c6c4c3543f84d04e2fe150f5509925fddb0f752f29e3e6d565561648b867b69e941801f2de2651f2b850bbe05e7886bc22c4ee901b4e3c30599a2ecc53bdb3c63e056391977", 0xb9}, {&(0x7f0000002f00)="1adf0f4c7ce684116e44e18e6ffa51a671e1a7cb0cd5f858c08a255addb4e8df", 0x20}, {&(0x7f0000002f40)="2d91322137d9eb3265d166bf090d6bef08f46004a2515e06d19a4cf2d4ef632a43218ec6e8d5e5a81c7d1960d2f23cb0314e8c848ab330bd9ea3e373b6dff0ce06aeb5beb05ff50945d1", 0x4a}, {&(0x7f0000002fc0)="59a6c51bacc0bfbb533574a5c704159d7393e788d6ea2f9ae9c9376dec00186a0893a75e5771e405b702953e4709a0135bd59b50fb68f8d50139197f555d47f04cbdd3784f0e3c7e1f530b9fc7f7695df580037d0ba6f810ccd8226fc168a117030ef2e048c6eddf2482cbeffb6999", 0x6f}, {&(0x7f0000003040)="cc9d78da1be8b2e153fce7852cc30ee00f6471325c6f3931f57f6bf5e2629dcafe9f243ff60851284db3e9a453737d5bef6e", 0x32}], 0xa}, 0x200}], 0x3, 0x54feb0599760d218) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) fcntl$notify(r2, 0x402, 0x21) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080), 0x4) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x200202, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r3, 0x0) 14:44:31 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0xff7ffffffffffffc) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x2, "c8d220043e8602c1"}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:31 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000100)={'veth0_to_team\x00', 0x2}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0106434, &(0x7f0000000200)={0x5, 0x0, 0xfb117f09f475fc23, 0x43}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40086436, &(0x7f0000000240)={r3}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) socket$nl_xfrm(0x10, 0x3, 0x6) 14:44:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x9]}}, 0x1c) geteuid() 14:44:31 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x4) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f00000001c0)) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000002580)=""/4096, 0xffffffffffffff8a) fadvise64(r0, 0x0, 0x6699, 0x3) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) 14:44:31 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x20000) ioctl$NBD_CLEAR_QUE(r0, 0xab05) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="29703fa1aa6c0efce7ca9d8e6882cfbbc0ceec84ee2938782e58a844ec9c7e0e8f208e41f51505000000baedd99a8cf0a2e56c4e65a0d61e959cae60dff8e7a016a9a75a0d83f70e02f78a722433cbba6bcc76000df3a2d60399098d08bbd15914185329c3603009e42d1e7c6aa66480317be1467e934e78d8eab30d7a7ddfa7924f0133590d5c5e993b99afb7651f92e724ebf7c0c97534684ccee6b3e2baa234b86011e8a39323a591af15131f9ead48d2a637018f1eb7e7c3171350f8fedbc7ba"], 0x4) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000100)=0x3) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x8, &(0x7f00000000c0)=0x4) 14:44:31 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) 14:44:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x400800, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="d20000000004000003000000ee6b1043d396178592c1d75953d1f6e67348601c071a2339b5cbbfb23dbcae89a076f65e9c85d9fa5254e9621d903ed0ec63d3e86d9c7ddc4ceac56d15cbed8ab00ffe21e2f9ec728a8412af90a46c068b45ff18f3cf7aa589798971aa9ba5daf9c68d21f2579ab46d7187db594d08cb6a2aa1482e854c41d986a5c41cc7a6cf29ddc783ef7a5ec6812252da56d84f9b1aaa835119f983b8095d9cd2dddf79fa12c9e22fad25cd96e0fa5721c81083f95bee8fdd846d3673f3152f382852cc211837f23b9fb70a103d88b038ea4a3697dda605c499df251883da1194"]) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000000c0)={0x2000}) 14:44:32 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1ef3, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:32 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="28c1f34764e6ef9dbcae8829705a00000000000000001dec9a6b8c3cbe8ee23ef0902a816ebe96fc053279c983d377ee2f42c4cf07ee05c749570a595cea68a5189a780c1ea3130225fd6c2e0c9c62b7a100"/91], 0x4) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000200)=0x3) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x204001, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000140)=0xfffffffffffffff7) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000280)) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000180)) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000100)=0x1) write$eventfd(r2, &(0x7f0000000240)=0x100000000, 0x8) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000080)=r2) 14:44:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xa]}}, 0x1c) geteuid() 14:44:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:32 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7f, 0x210900) dup3(r0, r1, 0x0) 14:44:32 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x5) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x5, 0x40000) write$P9_RWALK(r2, &(0x7f0000000100)={0x71, 0x6f, 0x1, {0x8, [{0x8, 0x3, 0x4}, {0x90, 0x2, 0x3}, {0x2c, 0x1, 0x2}, {0x8b, 0x1, 0x6}, {0xa, 0x2, 0x8}, {0x8c, 0x0, 0x2}, {0x84, 0x0, 0x7}, {0x1, 0x4, 0x1}]}}, 0x71) 14:44:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xd) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x40}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000280)={r2, 0x9, 0x4, 0x2, 0x100000001, 0x2}, 0x14) getdents(0xffffffffffffffff, &(0x7f0000002580)=""/4096, 0x1306) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x6}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r3, 0xda2}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r4, 0x4) msgget(0x2, 0x181) 14:44:32 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x1ff) r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x6) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x200, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0xfffffffffffff749) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x101000) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7, 0x400000) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000000c0)={0x2, 0x38, 0x1, r2}) write$binfmt_script(r3, &(0x7f0000000180)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xe]}}, 0x1c) geteuid() 14:44:32 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) accept4(r2, &(0x7f0000000100)=@nfc_llcp, &(0x7f00000001c0)=0x80, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10400, 0x0) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x1bd) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) [ 1876.316736][T26817] Unknown ioctl 19301 14:44:32 executing program 3: times(&(0x7f0000000000)) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000080)=0x800) 14:44:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x10]}}, 0x1c) geteuid() [ 1876.496831][T27174] Unknown ioctl 19301 14:44:32 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x103080) fallocate(r0, 0x10, 0x5, 0x169) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCCBRK(r0, 0x5428) recvfrom$inet6(r1, &(0x7f0000000200)=""/135, 0x87, 0x10021, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000000c0)=0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000023, &(0x7f0000000080)=0x80000000000001, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = memfd_create(&(0x7f00000002c0)='#! D\x86\xeaf\x12v\xf5b\xe0\x04t\xe0^\xad\x9f\x8c\x8f\x81\b\xfe\x9d\x8cM\xe5\x14tpv`\x04fm~b\xcc\xec\xca', 0x4) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="beb9cf50"], 0x4) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffffffffffff, 0x800) sendto$unix(r0, &(0x7f0000000200)="fdebb9ef6d3a0bb508d4e1f936210e47f59458ba7083c38b66ccdad3ae77f539df6789e850b72e289352122b3dea61263808c5e07cf1b38507649f023e2143bace9a1e3154e23f8b4c7d559e5e6096925242591bf471621926dbf37c77a96b528abb8783cdfaa13021c103faff915cb2f4c1542b0f8b", 0x76, 0x40000, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e22}, 0x6e) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0xe6) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='veth1\x00') getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:32 executing program 3: rt_sigtimedwait(&(0x7f0000000080)={0x3}, &(0x7f00000000c0), &(0x7f0000000140), 0x8) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r2, r3, 0x0) 14:44:32 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x705200, 0x0) connect$l2tp(r2, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x3, 0x0, 0x2, 0x2, {0xa, 0x4e21, 0x6, @rand_addr="55434e629b7db79f1249ecde16c7ed5e", 0x3}}}, 0x32) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:32 executing program 4: r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x3f, 0x0, 0x8000000000000000, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xf83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000001580)='/dev/video37\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x58, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100000101000, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'team0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="20000000c500000029d851c1f73a13af620931996001a4b8040200000000000000b125f30d13d6f39263f719defbd8f960621fac8175554ef48828c0c1f69fce13fa98111d5b76ad1cf7e438ebf23b0bf347946a49dcaacd789eed46f06819804d63fc73e17872d413f5ce47d22afbb26ed4cd0de871af729c5074bf95ee208b49bfe859cd81ed4e7767fb9f6d5453645943c1427c445782e6749cfd90b36c8d03a40cbb9d8d702bc3e7c3858d34e8ec1aa2a6136467a168bfc9c4e6bcdf1ec0000000000068a1000000000000"]}) pwritev(r2, &(0x7f0000001500)=[{&(0x7f0000000040)="87", 0x1}], 0x1, 0x3) getdents(0xffffffffffffffff, &(0x7f0000004580)=""/4096, 0x5f1) r5 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VHOST_SET_VRING_BASE(r5, 0x4008af12, &(0x7f0000000640)={0x2, 0xfff}) 14:44:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x14]}}, 0x1c) geteuid() [ 1876.772318][T27557] QAT: Invalid ioctl 14:44:33 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{}, {}, {}]}) rt_sigpending(&(0x7f0000000080), 0x8) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000000c0)={0x67, 0x8, 0x1, r1}) dup3(r0, r1, 0x0) 14:44:33 executing program 2: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x40000, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8840, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x28200, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x0, [], [{0x2, 0x0, 0x2, 0x6000, 0x70, 0x6}, {0x7fffffff0000, 0x9, 0x8, 0x9, 0x20, 0xfffffffffffffff8}], [[], [], [], []]}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0xfffffffffffffd74, 0x1) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000280)='./file0\x00', 0x8000, 0x401) mount(0x0, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x20010, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:33 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x200) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x608000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) 14:44:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x54]}}, 0x1c) geteuid() 14:44:33 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x200, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000180), &(0x7f0000000200)=0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00!\x00\x00\x00'], 0x5, 0x1) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')Z\t'], 0x4) execveat(r0, &(0x7f0000000300)='\x00', 0x0, 0x0, 0x1000) 14:44:33 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x4080, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x67fc, 0x200) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a45323, &(0x7f0000000080)={{0x1ff, 0xaf8}, 'port1\x00', 0x4, 0x20012, 0x0, 0x5, 0x9, 0x921, 0x5b19, 0x0, 0x3, 0x200}) 14:44:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xfc]}}, 0x1c) geteuid() 14:44:33 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) membarrier(0x4, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:33 executing program 0: r0 = memfd_create(&(0x7f0000000180)='eth0z,[)@\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="83cf7d4b640cda61985829705a09c253c3dd39dd12278777d8a7d5b2aca59eb58c9859536fce6e3c9cd93edcce1b18960f7e0acbadcd44b19349506b6838962dc367ede5114b71fdc744d7422977a53418076562e7cee461d4cd04242b8b2e23d1e7c9563cf0c5182813054e8495d4fe58b6b80b8a36c84336a703a76f7b646b6755952f3d933a6ed3754f2c7578df8bd4f508135b96443b5043ea83341b8693850bef536aa6fc6e4a53d5c5c8d58adf97fc517b25da590437823e2f420cd4e8ec29796a75770ed458fedf3769e2f27045b161e8fbd9314f6a3b372e138e"], 0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x6, 0xffffffffffffffff, 0x1}) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x45b6, 0x0) execveat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1003) 14:44:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x22, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x109180, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000000c0)=0xbd9) 14:44:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x1f4]}}, 0x1c) geteuid() 14:44:33 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x8000, 0x32, 0x0, 0xffffffffffffff9c}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xa000, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x800, 0x0) dup3(r0, r2, 0x80000) 14:44:33 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x1) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="e0ffeb31bca68aaab928a020707519dd6051f1315791df971e14c6ba305c9caafef21c4ae2717b161ec4fe00077a8e554e8c48326b1ad98a64cb6f88f296bcb45700a477eebd46aa75ff9a3e394bb04cde60b4fdda0be1424d93f1a251a57c02d39fe42472d81319a285b7311154229d3e544f8cfd3e1b52ac4ebb63fa24"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x402, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f00000000c0)={0x5, @broadcast}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x80001) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x10020000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:33 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x100000000, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000100)={0x2, 0x0, 0x2, 0xfffffffffffffff9}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40086437, &(0x7f0000000140)={r2, 0x20}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x33, 0x0, 0xffffffffffffff9c}) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000001c0)={0x4, r1, 0x1}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f00000000c0)) 14:44:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x218]}}, 0x1c) geteuid() [ 1877.573432][T29162] Unknown ioctl 1074021065 14:44:33 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x10, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x10001, 0x1) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000040)) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(r1, &(0x7f0000002580)=""/4096, 0x1000) 14:44:33 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x200980) getpeername$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c) 14:44:33 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x400000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x50201, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000140)=""/220, &(0x7f0000000240)=0xdc) 14:44:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x240]}}, 0x1c) geteuid() 14:44:33 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x2, r1, 0x30, 0x0, @ib={0x1b, 0x4, 0x80000000, {"45d48909db60dd485516552b0420569c"}, 0x9, 0x3, 0x3}}}, 0xa0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0xd) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000340)={0x30, 0x5, 0x0, {0x0, 0x3, 0x6, 0xc0}}, 0x30) 14:44:33 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0xb45fa7e1d3a4c00b, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x8, 0x20, 0x0, r1}) dup3(r0, r2, 0x0) 14:44:34 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x7, 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:34 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000100)=@xdp, &(0x7f0000000080)=0x80, 0x9c15f28d68f4ba9e) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000002c0)=0xe8) r3 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1, @in=@empty, 0x4e20, 0x3, 0x4e24, 0x5, 0x2, 0xa0, 0xa0, 0xff, r2, r3}, {0x100000001, 0x3, 0x9, 0x6, 0x5, 0x80, 0x5, 0xc1ea}, {0x100000000, 0xd41f, 0x4, 0x97e}, 0x7, 0x6e6bb4, 0x2, 0x1, 0x2, 0x3}, {{@in=@multicast2, 0x4d2, 0x3c}, 0xa, @in6=@remote, 0x3506, 0x5, 0x3, 0x7, 0x0, 0x4, 0x80000000}}, 0xe8) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:34 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x2) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, r1}) dup3(r0, r2, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000080)) 14:44:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x5917d949a029ba06) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0xfe, 0x20000) r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) getdents(r0, 0x0, 0xffd9) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='dummy0\x00') 14:44:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x300]}}, 0x1c) geteuid() 14:44:34 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="f7ffffff474c2800d927c7882078492f1722b5822eda6ebb3effd9e80e0acd7de3331c0a0daf577f47c6af05aefb0c6108fd6f8c501e42e9f1f21c439612596afd2496109df6e37fd50eac64b1c1d2316801b29604a156cedc2fb7a4894b778cfa2584b8b85711508a65c4f00c7bf0296392ea1640d5336dd87b16081742ff0f3c7896eb12d006c76815c84e1ee9e6ba0c8000000000000000fb1262b856ac8bdbd5125c2cf1ed75598001a765c4476bed32b0c1b6688d117b36e270ea45b4958d2d2aa22f733ae0"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100), &(0x7f00000001c0)=0xb) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000200)) getegid() ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000040)=@ethtool_pauseparam={0x0, 0x8, 0x4}}) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) [ 1878.169496][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:34 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1f, 0x400000) ioctl$PPPIOCSACTIVE(r0, 0x40087446, &(0x7f0000000200)={0x2, &(0x7f00000001c0)=[{0x401, 0x100000001, 0x8, 0x7}, {0x401, 0x7, 0x900000000000, 0x2}]}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8a8, 0x400) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f0000000100)={{0x3}, 0x8, 0x4, 0x7fffffff}) connect$vsock_dgram(r3, &(0x7f0000000240)={0x28, 0x0, 0x0, @reserved}, 0x10) 14:44:34 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000180)=""/4096) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f00000000c0)={'veth0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r2, r1, 0xf, 0x1}, 0x10) dup3(r0, r1, 0x0) 14:44:34 executing program 0: r0 = memfd_create(&(0x7f0000000140)='}\x00', 0x20000) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="29705a09a5955afd75"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x700, 0x70bd27, 0x25dfdbfd, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4000) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) 14:44:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x100, 0x0) chroot(&(0x7f00000016c0)='./file0\x00') recvmsg$kcm(r0, &(0x7f0000001680)={&(0x7f0000000200)=@alg, 0x80, &(0x7f0000001540)=[{&(0x7f0000000280)=""/87, 0x57}, {&(0x7f00000000c0)=""/45, 0x2d}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/37, 0x25}, {&(0x7f0000001340)=""/187, 0xbb}, {&(0x7f0000001400)=""/173, 0xad}, {&(0x7f00000014c0)=""/47, 0x2f}, {&(0x7f0000001500)=""/13, 0xd}], 0x8, &(0x7f0000001580)=""/228, 0xe4}, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x3e8]}}, 0x1c) geteuid() 14:44:34 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:34 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) socket$nl_generic(0x10, 0x3, 0x10) dup3(r0, r1, 0x0) 14:44:34 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 14:44:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x2000011, &(0x7f0000000240)='.*$vboxnet1wlan1\x00') getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x500]}}, 0x1c) geteuid() 14:44:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$isdn(0x22, 0x3, 0x27) syz_genetlink_get_family_id$tipc(0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x4000) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) [ 1878.718509][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:34 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000001c0)={r1, 0x2c, "f138fb6c353d17b3e0d8389ef7d0b7324fcce8fde56fc6bef6a7000212904e9246e73047ee7816a229e8c9cf"}, &(0x7f0000000200)=0x34) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) 14:44:34 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) set_robust_list(&(0x7f0000000100)={&(0x7f0000000080)={&(0x7f0000000000)}, 0x5, &(0x7f00000000c0)}, 0xc) r2 = syz_open_pts(0xffffffffffffff9c, 0x200000) syz_open_dev$audion(&(0x7f0000001580)='/dev/audio#\x00', 0x100000001, 0xc00) r3 = syz_open_dev$adsp(&(0x7f00000015c0)='/dev/adsp#\x00', 0x1, 0x200000) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001240)=0x0) ptrace$getregs(0xc, r4, 0x1, &(0x7f0000000200)=""/4096) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000140)={0x9, 0x6, 0x0, 0x5, 0x0, 0x7}) dup3(r0, r1, 0x0) 14:44:34 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="91f076edc1e0466c09b6b11a648d914fef96ebf4cc5eea47747634cea76b3ad1b5526f55853a3cf1b2e31e4ba777f3f1643f7e184a8106cf9cad90cf066d05108b61c246900f9187a833b5c8414e7c50dfd8c931f4876b38e5da8ede5bf8a5972259e5128ef0d8894996f2f451b57631e8d3d0b79a4cd9750bcb36b0179c613eef7cbd770c8500d30a4d78cac8ab19869b870461e8c16423798d1a804853d4369fe07a1e680e89b6b659b230b48f44c3bc42ed6e113cff4db33b70bada56f95ae87c653afca801eab4c086d6d34f87248aa1e7648e087e18d8526eae7e4cce8d2765cda631ad83d72d92010821c2ae"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10000003, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f00000002c0)={{0x1, 0x7}, {0x9}, 0x1f, 0x4, 0x7}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x40, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x400caeaa, &(0x7f00000000c0)={0x1f2a, 0xb5fb}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x600]}}, 0x1c) geteuid() 14:44:35 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x0, 0x8000) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x1) 14:44:35 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000780)='/dev/dsp\x00', 0x800, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb30053e20a8beabf537041e7c6bb10af024c51a67644905dd34f14037a0b0d437083176aa62cacc06cc78724e178c"], 0x30, 0x1) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000080)) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000006c0)={0x403, {{0xa, 0x4e22, 0x3, @remote, 0x2}}}, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0x47, "0b00afdfc0a29d20020fa4b9c766c2a3c7c8d687e1a2b5f94e0b7d58f1c99704056c9a22ee0390369b5dc9d733ff79a8e6719845b9103aceab8af0151ed2e1de723dd6e1b92e52"}, &(0x7f00000000c0)=0x4f) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r2, @in={{0x2, 0x4e21, @local}}, 0x9, 0x9}, &(0x7f00000002c0)=0x88) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc004240a, &(0x7f0000000380)={0x3, 0x0, [0x0, 0x0, 0x0]}) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f00000005c0)={0x0, 0x3, 0x6, 'queue0\x00', 0x100}) sendmsg$NET_DM_CMD_START(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0xd04, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4008001) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000680)=0x6) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={r2, 0x9}, &(0x7f0000000340)=0x8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1879.030102][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:35 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x44) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000001500)=ANY=[@ANYBLOB="0472f3d68ab5347bfd486a54718cfc0605000000000000006300"]) finit_module(r0, &(0x7f0000000040)='security^\x00', 0x1) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000200)={0x1000000000000001, 0x7, 0x1, "24f0477e9b76f09bec474ee20ed18d4d3d8e0b54019ddfc168944cdb2b6f3c55", 0x7f435767}) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x100000000000008, 0x30, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000001540)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000001640)={r2}) r4 = creat(&(0x7f0000001440)='./file0\x00', 0x2) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000001480)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x4000, 0x1}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000001400)={0x6c, 0x0, &(0x7f0000000380)=[@acquire_done={0x40106309, r3, 0x1}, @reply_sg={0x40486312, {{0x0, 0x0, 0x2, 0x0, 0x11, 0x0, 0x0, 0x40, 0x40, &(0x7f0000000300)=[@fda={0x66646185, 0x8, 0x3, 0x18}, @fda={0x66646185, 0x9, 0x2, 0x25}], &(0x7f0000000340)=[0x28, 0x18, 0x20, 0x0, 0x0, 0x40, 0x58, 0x38]}, 0x90}}, @decrefs={0x40046307, 0x2}, @exit_looper], 0x1000, 0x0, &(0x7f0000000400)="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"}) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f00000014c0)={0x6, 0xa, 0x3}) 14:44:35 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) timer_create(0x5, &(0x7f00000003c0)={0x0, 0x2, 0x1, @thr={&(0x7f0000000240)="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", &(0x7f0000000340)="313370832bbcfb"}}, &(0x7f0000000000)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getdents(r2, &(0x7f0000001580)=""/4096, 0xffffffffffffffd2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x7ff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000400)={r3, @in={{0x2, 0x4e22, @multicast1}}}, &(0x7f00000001c0)=0x84) 14:44:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x700]}}, 0x1c) geteuid() 14:44:35 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x80d01, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000)=0x2, 0x4) 14:44:35 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='7\t\x00\x00'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:35 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffe, 0x40000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x400000000000000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e21, 0x0, @mcast2, 0x3}}, 0x200, 0x4, 0x4, 0xc308, 0x8000}, &(0x7f0000000280)=0x98) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f00000000c0)=0x2) [ 1879.357902][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x900]}}, 0x1c) geteuid() 14:44:35 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) sysfs$2(0x2, 0x1, &(0x7f0000000000)=""/34) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:35 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) chroot(&(0x7f0000000080)='./file0\x00') ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = semget$private(0x0, 0x1, 0x0) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000001c0)=""/190) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) [ 1879.596630][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:35 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) timer_create(0x1, &(0x7f0000000500)={0x0, 0x2, 0x0, @tid=r1}, &(0x7f0000000540)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:35 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x420900, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="29705a09eb225c55555d000878df89af15c70000f7a5f0b3b237ba636679137ee502284a9b856af64da7fe010e294165a7c483f1b02f31315c27819cd7742f899bde5abad3"], 0x4) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000000c0)={@remote, @remote, 0x0}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', r2}) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x1) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xa00]}}, 0x1c) geteuid() 14:44:35 executing program 3: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaef2, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r0, 0x0) 14:44:35 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x101080, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80880, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0xfffffffffffffff7, @local, 0x7e90}}, 0x0, 0x0, 0x672c, 0x22da008d, 0xd8}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000300)={r1, 0x2}, &(0x7f0000000340)=0x8) 14:44:36 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x20000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x4, 0x1, 0x0, r1}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r2, r3, 0x0) [ 1879.856057][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:36 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r3, 0x17, "905397", "e13889ed84eeeccb18395fd9ef14b371c740b806e7781f27e898de1840a7007ce528a61e7a20b7ca5487df993006e6f1b5fcdbc482db6e54273909963cae1bfd09174bb5be47e6b3bef5afb535a22a1a352035c868d6c53fdfc4f5b41d96cb3fed952251b97eacb497c01bf02f82928ad62a0735d301f73788ac959d537bddbec2148dd5a1f6d5d275eb16c68977b18dce87adce6b652bbe31007cac78dcb35722f2a4f9af41a2b05b39440c76cb0b390c5d9fb39e5d0b3827c82b89065f69125ab69f30f75725ac5d96f8b3f0fa1da1684c16ea2a06c583d4d94ec49b51eb828180aa50ec65fb271237f42c60bf446d28db5f1f86ea00"}}, 0x110) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:36 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x0) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/packet\x00') write$P9_RSTAT(r2, &(0x7f0000000080)={0x4c, 0x7d, 0x1, {0x0, 0x45, 0x80000000, 0x7, {0x80, 0x1}, 0x40000, 0x49, 0x3, 0x30, 0x0, '', 0x3, '#! ', 0xc, 'nodevem0self', 0x3, '#! '}}, 0x4c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000300)={0xa0, 0x0, 0x5, {{0x5, 0x3, 0x8, 0xff, 0xab0, 0x9, {0x2, 0x2, 0x1, 0x2, 0x9, 0x9, 0x200, 0x2, 0x9, 0x0, 0x7, r3, r4, 0x80, 0x4}}, {0x0, 0x4}}}, 0xa0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000140)=0x40) 14:44:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x101400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f00000000c0)={0x2, 0x6, 0x8, 0x7, 'syz0\x00', 0x8}) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xe00]}}, 0x1c) geteuid() 14:44:36 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10000, 0x80100) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, r1}) dup3(r0, r2, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 14:44:36 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffff9c}) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000100)={@remote, @empty}, &(0x7f00000001c0)=0x8) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xa0000, 0x0) syz_genetlink_get_family_id$tipc(0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2002, 0x0) faccessat(r1, &(0x7f0000000040)='./file0\x00', 0xe, 0x800) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:36 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000100)={r2, r3+10000000}) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x28000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000000200)={{0x2, 0x226}, {0x6, 0x73}, 0xffff, 0x1, 0x5}) [ 1880.224745][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0xd3}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000240)={r1, 0x7}, &(0x7f0000000280)=0x8) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:36 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = getegid() getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee00, 0xee01]) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x6, &(0x7f0000000400)=[r1, r2, r3, r4, r5, r6]) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r7, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r7, 0x40086200, &(0x7f00000000c0)=0x2) r8 = pkey_alloc(0x0, 0x1) r9 = dup3(r0, r0, 0x80000) ioctl$UFFDIO_REGISTER(r9, 0xc020aa00, &(0x7f0000000440)={{&(0x7f0000ff1000/0xf000)=nil, 0xf000}}) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x9, r8) 14:44:36 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x4, 0x800) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) sendfile(r0, r1, &(0x7f00000001c0), 0x1) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f00000000c0)) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r2, r4, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x10000, 0x0) 14:44:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x1400]}}, 0x1c) geteuid() 14:44:36 executing program 0: r0 = memfd_create(&(0x7f0000000080)='\',.lo\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="29e8405e608f3093ded056257da6"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x2000) r2 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x0, 0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r3}], 0x1, 0x0, 0x0, 0xffffffd7) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000200)={0x4c, 0x0, &(0x7f0000000640)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000100)='k'}) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f0000000100)=[0x3, 0x3], 0x2) 14:44:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0x9}, 0x28, 0x3) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 1880.492792][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:36 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10002, 0x0, 0x3ff, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, r0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x10000, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) tee(r0, r1, 0x1, 0x1) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) timer_create(0x4, &(0x7f0000000100)={0x0, 0x1c, 0x6}, &(0x7f00000001c0)) 14:44:36 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x40, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r2, r3) 14:44:36 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x4, 0x7, 0xb000}, 0x4) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x1802]}}, 0x1c) geteuid() 14:44:36 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x10080) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000140)) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x101000, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x100000001, 0x2) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40046432, &(0x7f0000000100)=0xffffffff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f0000000040)=0x1) 14:44:36 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x6000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000440)=0xe8) r3 = getegid() fchownat(r1, &(0x7f00000000c0)='./file0\x00', r2, r3, 0x100) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x28000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x100000000, 0x6, 0x2, 0x1, 0x5, [{0x1, 0x8001, 0xffffffff, 0x0, 0x0, 0x1000}, {0x9, 0x5, 0x9, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x9, 0x0, 0x0, 0x400}, {0x1, 0x7, 0x4}, {0x0, 0x4, 0x3f, 0x0, 0x0, 0x1000}]}) 14:44:36 executing program 2: r0 = memfd_create(&(0x7f0000000300)='\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3e, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x2}}, 0x40) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f00000000c0)="2e2ef34a0f2c91001000024b99c441896c5b038fa94094418e660f3a0c6fcbef2e03b200000000660fe9f5660f3829efc4617a6fa2fd000000c4e1c1e16ea1") 14:44:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x2000]}}, 0x1c) geteuid() 14:44:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x1}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x9, &(0x7f0000cecffc), 0x4) 14:44:37 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$sock_ifreq(r2, 0x897f, &(0x7f0000000080)={'teql0\x00', @ifru_settings={0x5, 0x6, @fr_pvc_info=&(0x7f0000000000)={0x8, 'tunl0\x00'}}}) dup3(r0, r1, 0x0) [ 1880.996302][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:37 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x430000, 0x0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x100) 14:44:37 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd67, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@sha1={0x1, "003632d91db5f4f62e04ba0059d418aa31bd8123"}, 0x15, 0x2) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000200)={0x1, 0x7fff, 0xffffffffffffff7a, 0x0, 0x4}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x5f157b382152f8a1) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x10400, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x2ee0]}}, 0x1c) geteuid() 14:44:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x400000032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0xd, &(0x7f0000000100)={0x0, 0x0, 0x2}, 0x8) close(r2) close(r1) 14:44:37 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)) [ 1881.378931][T21710] binder: release 1905:1979 transaction 21 out, still active [ 1881.386729][T21710] binder: undelivered TRANSACTION_COMPLETE [ 1881.436996][T21710] binder: send failed reply for transaction 21, target dead [ 1881.449049][T21710] binder: send failed reply for transaction 22 to 1905:3238 [ 1881.483742][T21710] binder: undelivered TRANSACTION_COMPLETE [ 1881.516568][T21710] binder: undelivered TRANSACTION_ERROR: 29189 14:44:37 executing program 2: msgget$private(0x0, 0x40a) creat(&(0x7f00000001c0)='./file0\x00', 0x4a) bind$pptp(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x8) msgget(0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r0 = request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', 0xfffffffffffffffa) keyctl$update(0x2, r0, &(0x7f0000000300)="ef9553672517588e4a5d3e6a4aab1238e78974ee20bb8e4799d80fcf585f79a408b3d2a1f35ec40cb3795983ecc90fd678d298de28671a1a298355fb6a1b3fad7373e71dc14706f0bce83c71ff5f4d2df3f1cdbed3fcc46448fc97c01d3099ac3c5b70c056a850bc5801d77c69a6c53bd625d7caef4242d3a38be1074bab7f44c87e4ecf66aff63916b06e7e33e36a9e93ca2ef1cf9dcccce7e1e345a5664e4dd9dd3506e01ebc2eb245e11fb61d610cab604c6d4b21703671da1f47a539375e25291c62b31ae1bf17ab0ab4785bf2abc6b78afd0c7f14f19e19c60ab7092382", 0xe0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x4000000020000000) getpgrp(0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 14:44:37 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:37 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/4096, 0x1000) r1 = getpid() r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x80000000, 0x2, 0x6, 0x7f, 0x0, 0x8e1b, 0x8009a, 0x0, 0x4, 0x6, 0x426f0000000000, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x1f, 0x1fc0000000, 0xffffffff7fffffff, 0x2, 0xfffffffffffffffc, 0xf6, 0x930f, 0x3, 0x3, 0x6, 0x0, 0x2a01e462, 0x0, 0x200, 0x8, 0x870, 0x7, 0x9, 0x9, 0x8, 0x3f, 0x1ff, 0x6, 0x0, 0x1, 0x7, @perf_bp={&(0x7f0000000080), 0x4}, 0x20000, 0xfffffffffffffff9, 0x0, 0xd, 0x1, 0x5, 0x14c391b5}, r1, 0xffffffffffffffff, r2, 0x1) 14:44:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x4000]}}, 0x1c) geteuid() 14:44:37 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x3) write$binfmt_elf32(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="7f454c460006090600000100000000000300060003000000c7010000380000008a000000060000000100200002000400001003000000000003000000ff010000000000008100000009000000ffffffff0700000009000000000000600500000005000000e08d650f0200000000000000b60b00000700000064820d62f8f1b32cb1c118d4e61100"/520], 0x208) close(r1) r2 = memfd_create(&(0x7f00000000c0)='\xba\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="01"], 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 1881.721935][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:37 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000040)='schedstat\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:37 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) write$vhci(r1, &(0x7f0000000280)=@HCI_VENDOR_PKT={0xff, 0x80}, 0x2) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000, 0x200000) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x3, r4, 0x1c, 0x1, @in={0x2, 0x4e20, @loopback}}}, 0xa0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000040)={0x0, 0x0, 0xdd}, 0xc) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x39, 0x4, @thr={&(0x7f0000000400)="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", &(0x7f0000000640)="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"}}, &(0x7f0000000300)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:38 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')PZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x4002]}}, 0x1c) geteuid() 14:44:38 executing program 2: msgget$private(0x0, 0x40a) creat(&(0x7f00000001c0)='./file0\x00', 0x4a) bind$pptp(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x8) msgget(0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r0 = request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', 0xfffffffffffffffa) keyctl$update(0x2, r0, &(0x7f0000000300)="ef9553672517588e4a5d3e6a4aab1238e78974ee20bb8e4799d80fcf585f79a408b3d2a1f35ec40cb3795983ecc90fd678d298de28671a1a298355fb6a1b3fad7373e71dc14706f0bce83c71ff5f4d2df3f1cdbed3fcc46448fc97c01d3099ac3c5b70c056a850bc5801d77c69a6c53bd625d7caef4242d3a38be1074bab7f44c87e4ecf66aff63916b06e7e33e36a9e93ca2ef1cf9dcccce7e1e345a5664e4dd9dd3506e01ebc2eb245e11fb61d610cab604c6d4b21703671da1f47a539375e25291c62b31ae1bf17ab0ab4785bf2abc6b78afd0c7f14f19e19c60ab7092382", 0xe0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x4000000020000000) getpgrp(0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 14:44:38 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8001, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0086401, &(0x7f0000000080)={0xb9, &(0x7f0000000200)=""/185}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) utime(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x7f, 0x9}) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x1) 14:44:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) getdents(r0, 0x0, 0x2d) 14:44:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x5400]}}, 0x1c) geteuid() 14:44:38 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xa0) getsockopt$inet_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000200)={r2, 0x1, 0xa2, "c4d70f3c28412011b84406b376773c9ae2c33e108cc2b879be36e13a1ba775c12d27887522ff42f33abd69f4329da78ea7d2710af90e1982fa35532ba3045da3577ef3eabd1ae87953093b76cfcb561f8a382cfae4ed3cb9b79ada1d631d7ccae06e6ea22b938cecc3b66d5923c87237e6199896459c01f5b512f52649856a001e4d02c0f44ae072e951adc81c7da4efff3cf984639bbb738ab2f672c60b34ed44c6"}, 0xaa) 14:44:38 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7, 0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={r2, 0x7fff, 0x0, 0x47f, 0x7}, &(0x7f0000000200)=0x18) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$SG_SET_COMMAND_Q(r3, 0x2271, &(0x7f0000000040)) 14:44:38 executing program 2: msgget$private(0x0, 0x40a) creat(&(0x7f00000001c0)='./file0\x00', 0x4a) bind$pptp(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x8) msgget(0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r0 = request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', 0xfffffffffffffffa) keyctl$update(0x2, r0, &(0x7f0000000300)="ef9553672517588e4a5d3e6a4aab1238e78974ee20bb8e4799d80fcf585f79a408b3d2a1f35ec40cb3795983ecc90fd678d298de28671a1a298355fb6a1b3fad7373e71dc14706f0bce83c71ff5f4d2df3f1cdbed3fcc46448fc97c01d3099ac3c5b70c056a850bc5801d77c69a6c53bd625d7caef4242d3a38be1074bab7f44c87e4ecf66aff63916b06e7e33e36a9e93ca2ef1cf9dcccce7e1e345a5664e4dd9dd3506e01ebc2eb245e11fb61d610cab604c6d4b21703671da1f47a539375e25291c62b31ae1bf17ab0ab4785bf2abc6b78afd0c7f14f19e19c60ab7092382", 0xe0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x4000000020000000) getpgrp(0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 14:44:40 executing program 3: pause() syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r0 = getpgrp(0x0) syz_open_procfs(r0, 0x0) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f00000016c0)="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") 14:44:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x7fdc]}}, 0x1c) geteuid() 14:44:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000280)) getdents(0xffffffffffffffff, 0x0, 0xffffffffffffff5a) 14:44:40 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = socket$inet6(0xa, 0x6, 0x7) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x803) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000340)=""/98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x1, 0x10, 0x7, 0x1}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r3, 0xfff}, &(0x7f0000000240)=0x8) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x511a02, 0x0) r5 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x1000, 0x2002) execveat(r5, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x6, 0x8, 0xffffffffaf3ffe0b}, &(0x7f0000000080)=0x10) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, &(0x7f00000003c0)=0x2) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r6, 0x5}, 0x8) 14:44:40 executing program 2: msgget$private(0x0, 0x40a) creat(&(0x7f00000001c0)='./file0\x00', 0x4a) bind$pptp(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x8) msgget(0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x58002, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r0 = request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\x00', 0xfffffffffffffffa) keyctl$update(0x2, r0, &(0x7f0000000300)="ef9553672517588e4a5d3e6a4aab1238e78974ee20bb8e4799d80fcf585f79a408b3d2a1f35ec40cb3795983ecc90fd678d298de28671a1a298355fb6a1b3fad7373e71dc14706f0bce83c71ff5f4d2df3f1cdbed3fcc46448fc97c01d3099ac3c5b70c056a850bc5801d77c69a6c53bd625d7caef4242d3a38be1074bab7f44c87e4ecf66aff63916b06e7e33e36a9e93ca2ef1cf9dcccce7e1e345a5664e4dd9dd3506e01ebc2eb245e11fb61d610cab604c6d4b21703671da1f47a539375e25291c62b31ae1bf17ab0ab4785bf2abc6b78afd0c7f14f19e19c60ab7092382", 0xe0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x4000000020000000) getpgrp(0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000000000)=0x80, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0x0, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 14:44:40 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f00000001c0)=0x2, &(0x7f0000000200)=0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x22400, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x10001, 0xfff, 0xffffffff}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x3}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000400)={r3, 0x800, 0x6, 0x1, 0x1, 0x6, 0x4, 0x8001, {r4, @in6={{0xa, 0x4e21, 0x3f, @dev={0xfe, 0x80, [], 0x18}}}, 0x31e, 0xff, 0x40, 0xdd52, 0x8}}, &(0x7f00000004c0)=0xb0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0xfffffffffffffff8, 0xa0000000000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000000c0)={r5, 0xbc3, 0x8, 0xc7d}, &(0x7f0000000100)=0x10) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x49e2) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x80fe]}}, 0x1c) geteuid() 14:44:40 executing program 3: 14:44:40 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="297017625809"], 0x4) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x9, 0x40) 14:44:40 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x28) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x2) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3f, 0x400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x4000, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000240)={0x7, 0x4b, 0x2}, 0x7) getdents(r0, 0x0, 0x222) 14:44:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xb8ff]}}, 0x1c) geteuid() 14:44:41 executing program 3: 14:44:41 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000200), &(0x7f00000001c0)=0xffffffffffffff16) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) fanotify_mark(r2, 0x80, 0x40000020, r2, &(0x7f0000000100)='./file0\x00') timer_settime(r3, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000002580)=""/4096, 0x1000) getitimer(0x2, &(0x7f0000000000)) timer_settime(r3, 0x1, &(0x7f0000000240)={{0x0, 0x1c9c380}}, &(0x7f0000000280)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x40000, 0x0) getdents(r4, &(0x7f0000000080)=""/85, 0x55) 14:44:41 executing program 2: 14:44:41 executing program 3: 14:44:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x1}}, 0x0) 14:44:41 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 14:44:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:41 executing program 3: syz_execute_func(&(0x7f0000000800)="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") syz_execute_func(&(0x7f0000000240)="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") 14:44:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xc0fe]}}, 0x1c) geteuid() 14:44:41 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x4, 0x20) semctl$IPC_RMID(r0, 0x0, 0x0) 14:44:41 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)="94b96e03f6134335eaa099d80d73e1eebd52886c0de50c70f5ae2805937c581e0842a3b773891c3c0a6b7c07c8d7041755788e64acdb825e07604c8eb3f8528840647420a05c417334e048", 0x4b, 0x0) socket$inet_udp(0x2, 0x2, 0x0) keyctl$set_timeout(0xf, r0, 0x51) r1 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:41 executing program 3: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0xa001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000040)={0xfffffffffffffdc0}, 0x156c) syncfs(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) fdatasync(r0) 14:44:41 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@register_looper={0x40406301}], 0x0, 0x0, 0x0}) 14:44:41 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="a2f88675a1c8d34b95c5808aeb589964674feacce993a49977ad7aa1d767e5a6d05c69be4c73eec6d339e8e36aeb556cf85959c044a57ca0b54accf29c1fd8fbe9bf12125c623200000000000000"], 0x4) 14:44:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xdc7f]}}, 0x1c) geteuid() 14:44:41 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x7, 0x80000) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000280)={0x1, 0x10000}, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc044560f, &(0x7f0000000040)={0xfffffffffffff801, 0x6, 0x4, 0x2080001, {0x77359400}, {0x1, 0x8, 0x0, 0x32b, 0x7ff, 0x3, "3bd29592"}, 0x6, 0x4, @userptr=0x2, 0x4}) socket$can_raw(0x1d, 0x3, 0x1) r4 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0xce, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f00000001c0)=[@in={0x2, 0x4e20, @rand_addr=0x8a}, @in6={0xa, 0x4e21, 0x1, @empty, 0xef}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x5c) ioctl$int_out(r4, 0x810080004524, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000080)={0x0, 0xffffffff00000001, 0x1005}) 14:44:41 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x98ee, 0x40) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000200)={0x0, 0x0, @ioapic}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0xa0) recvfrom$unix(r0, &(0x7f0000000100)=""/8, 0x8, 0x10000, &(0x7f0000000340)=@abs={0x0, 0x0, 0x4e24}, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) [ 1885.559100][ T6077] binder: 6070:6077 got reply transaction with no transaction stack [ 1885.583839][ T6077] binder: 6070:6077 transaction failed 29201/-71, size 0-0 line 2900 14:44:41 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000100)={r2, r3+10000000}) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x28000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000000200)={{0x2, 0x226}, {0x6, 0x73}, 0xffff, 0x1, 0x5}) [ 1885.658706][T21710] binder: undelivered TRANSACTION_ERROR: 29201 14:44:41 executing program 0: socket$bt_cmtp(0x1f, 0x3, 0x5) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '#! '}, {0x20, '#! '}, {0x20, '#! '}, {0x20, 'wlan0/\x1c^wlan1'}, {0x20, '#! '}, {0x20, '#! '}, {0x20, '#! '}, {0x20, '#! '}, {0x20, '#! '}], 0xa, "1f3b4e62f58b17d1eef94b0dd0a9a17ffba8a59acc9eb14562cf697510aa1bdf031e2ce4ed93593f64dc3b7e92eddb0c5654dc3d0d66c353590d0716727a1f1fc6d9a5ea553c17e82ef13b70a84d5d37d7a400ef5d9c84829ad891167f7057695ab6d658675f33ffe0b72a9895d8c762d44c6e14b34fd13c05b46e26947e50c0367e5cecf05cd7320e703f35d2465ee23327c8f6bd742c8ca4321d7b2d12d80ecb6a7344f5aef539b81733d163fcadc1549961820ba4fda01f9f06946f443172cd59afdbdfe74de7d1987006b06b47e39901a2c3cd5c7c2cb1240ea37f6aed7dac51246c199b0aacdce12c2a1275dac8b44b8bc1c60aabb59be73c8103b7c31e11962a81e978da49ca804438b0d12f14eedf29f8185b4b249e33a0b0c461d7cb17e6f2543da80e7d27d3a95824763486b23f98cc3ab13c43c318f8b08081e73a8d7fa94d1b28b2570cc711fe29b5af09c05fb1b35d372bd43ab75e4956b4be53e5ffaa936cb5ba8cc43d90059f9cac61d4d6be9e306c7788776e1bd7741837cec321da210c06d711a179d40f83d6f185a07e554cbdab8e0cc8bbd32bd74f950183e04a1af9039e6d1d36b866d8a09b8e470abe5bd1d5df378690fe06b305f43337f66135cda1697e2b0af8a0f8d6931b3eb7ec5490bf1450ae353288ac80c7b0a1e674908aa09665101c0f631077c4473ef0f6a00ca04c756299e7400354d86c12813e28e09e059475ad496ef5d6906f7092a9868fe0f515ca6b8064ce1923713f6315e76e24e0956997712b03b7acbd908aef9f205c4f60b779e6afda5ec781a8f2d5353502abcb46df6359c2826597ab05cf484363441c39c9f6093f1d6bcf450ec2a73f740819ce85c52ef2f733bafc8b9a76311dfa1d5c2eb3a0afbb7bb08000baac318aacdc65b3ecaec44f248e239f5fe788d059301fa88f4789a2f6b85e4669ab89d493bdfd032b7b7835866ca683d0a7b77d853846ae4d38d62f09f5451d6326bb04d4bfefb02994df7a68c97fa50b15849edd6f3299318d1e4997c99a9ba3ddb068f222c0ee6a04ce0a62fbd769dc3105b62d3b972e973d75e8868fb1b135eb4e02d9058c956b4a3db0162d05740349ccde3f24347b42b9b327485ec9206d886dddc7c7ae3a7130cf15fcbd73e227e243eb5192b9773af196f134590eb4f7093b2a082b41e3a3f825b4267ccc34b49c3fe0b747b28361661185a1772ed586b8c01ead0f9c7d01a6da6f325aae6f07da028a99a64c6e36898fcac34ba0eedfd71e409a22f10586d716e3422df018cdf55d6dcd6ff55d646d30ac89b20dcded7b103a2866f830a6b9fd39acb61810f9c7e2b4a9ce745b4d813036896c6c50173c5c720a4a75d6b3ecd58291ddcb04bc9392338c4b2d0a889dac16482beb59c7181b5cb07ee907a9b4640fce3748efe761883f74bbdd94194253630ce6dc2284d534a4244a7150946fdd1177cd9a6f0d06c02e3960958a9c1e5032e34e2367a9d1ea365c6a2f2d1c3b8f46438715b574fd48822d76fce0c21eb096c59da3e773b183da5061aec9da4a685b39724a055504a9879f6bc52824a74dfe2039fd0a5c953b44742df5fbf1573da1f51109d75c1698b633777a1ce1cfc0fee171bec35676ffe21f023dbe9a3a403c8753d6908e00346ea1519bd7b56135de64ea1fc54e02f70939144f58b626ef964434b7dc1531df5556612fee3ae6d76808f2c5dab7383cebcd77543a8a3f7964f085f707c7495a578f6678297763a8503312de86b0ed1e3e0ff1ff1ab94decd1a46ccb4b414fe8748dcf26784e32575ac82c7db29a70361cfc71bf09109278dad0b36aacc93b53badc6bf9be896a9fe606bcebfd96c90b95ed2811be1e7b98b8fc63f42f7c2d70c7a68f0461ba3a84260fdd22b89225653ba4ee6467e4912913929d077f197868b015e78f45065033eeeaea247ff0a406838c2c0030736157642b26ad015429737a69a9a837b4a47e8600be32765fcaf35f7de2b1ec4db1e4bcbb5454e5a599615074d97978af312c75959608cd9ac92a3c9ae3353fcfda165c5a311ed4628de2af51eb97b0bfc7ac910d720a3e95d64f8c64f3de3095145509c3b661cdb4b9c2d59119e68ac31a093caf9173d7dfe68af479806cff008e47ea7e232bab7b0e5bebae054f6387eaf97683b23ab8c6518a10da8500cd324b6c0411e03c77797d24dfea70cd0c8b40c801463c0481e926ad5d045241adab5eec31c4d1c0a79128fc98e11b33995ccb92e1e3e8bcbb47978a20468f97ad161e4a525e58cc0a191a64daf682837eaa38f435fa6ebf8b554e1d8dfb873824b5e361aabc855a3286b1d23fe322b69c4ec3943bb24f8e56d23e60d0e599d6c57244ebc10e1574a674a84c21d57ac2740bfd48aa5a5e3cc7972873b1b223a254c2178c65e8df9c5dd14451caa85f0b59e61dd83695573c7b699dd257dc46e78907fd69a1a2164967542d8d8304df10c0ff5512377b8179b743b39ce2d7cfd781c50456918f852201d713542b4615572160366cacd59ee979ad73189400fd5e068977813eab3b8f4fe9a5a7e1720a743ab309b474f6d7baf3afb568f2573eab574b04a5b9863e44cbca437d3dc47d7bb91054af1f43a2587194af670c8ae036ede6499c374daf33fe0b300c17f06d08e6e06e79127fdc0a677b4f36604cb58c93102212c5e9641a89c7a808f9f8f446c18e55ca6866a783f0fb9246c068f4e1d518e77c909ea67e0a8443060660e9fa90fff66bfb9e31ce06cbdae3f1103ae2a7053411da4762de5540ffd989994269a9a4f50577500c5f8c01d7c7def6a8907fba3d82045d425990a4dd183b01857d9b2e86836960d58da931488d0b65b6cc5d71e412ce8bcf661f51a40411bb504786b3f17aeb289753bccb0250ee0e7b5427fc7692c6ddf4724b079023698097ae1ece35088eb0b579242639320bd4503a094f0912772b57a46fad728af90b3ec86e725541544bf91523b15438f7be317d7b47583f2d436f4ed380f09b1512d943bdd8e0bf20e98767f9509541e79cf13a3a324c728af3bc5383e49f2f21d119c117d4d9235902ede503af75060d4b3aa1f11f7a878e3a274e1419f72a28dc9c8e3ea0aac860785b62c6a20f634d96f89711af4949c9536b3be72130b4d97493b98ce0fa6a0b4807ed34a35d8cd510d1661f8c06a0c2fdaa3ee63ed417ab00ad45df424e793453eb992bcf05aefed5d74af0e01947917fd47b01527d696385282ad75bb98e6d2dc896fd48c556b6345da40a9e405662cbc4f524011dcdf84e1ad53a45d4ad271e1a6fdce9dae7ffb06720b61b38d7aba5fa1cce52b3bc36ebe5103a5f61418ef8a50ee723495562c9e3c08e73c8e6d0da6dfbec3606807e0d1552deb1b30414cb2ce8fb4798849b1370e0cd34591e6a5b79d7519ff776b3f1102bee44e6c16861adaf03394c91875f7c710d1b7993a99746b8b0472db3cb8bc6f3b246cf9aca319299e3c48104b408128a74873ce1160fab596ef6ae2654ba9ede777f295cc8a65dd2b6375891008e0027c9aef2bf536f6390b5ddac5685c95693f474576f0769809b3a78859480a0e2825ec6bfdf17dbd2f61e6fd60c0ee7cf684ae74b14e6c24ddb47dc356f799e67cf300c6c94d6cf0c1ed6fd214eeff89d064900a4b7a76f2a51f6fcc9fbc4a1de998f78c7d80b6a77aa14b90216e8852e034f3c9ea2388033a44e16dfbe22ecb742821e7130cd5d5fc45f8b275a10b3106a737fedb40e682d2ac7ee86f48efa613d4e55447ae2093e77f08c6a020432c18eae033de8cf20d59efe8bd1034b032b1a7af8575eedbf051d5d75c4469dc528ebe3625ccedea3ac696a057f2571fc08423b0b85fcdd3a7f6619d35f97168e4cd06255475ccb9e77a5aa043895c345f5d910c4f1b34f84f9e1b6566779621a5017fca3d14cc1405567402be4b9a2bf6b48b36ffce6a92eb795b532a3ad711d2e2023088e1f57723e98982dd323a2067ee1189330156852fd35fd77900fe30d57f4af2a7678dcddbc40c1338af75ec15ebd9350a066b452ae108fcb1474fc71e6bedcdef1fc2cf604a37a1a6700ebc0d01ee368842f210dfb35f6cc7f43444a168f9e3cadde5d95f45d0d24e1dd8e6e571b08b3d6507fd25e522ce4bc7e43a8cf9c8223036b99fd781a61ca736ab36c5377a9e6dbe88eca3da3f1b14707ef30146679dc39e55792ceed40a6ca260f8185b65fac482da94c9f99a07085fe32874fe6f4ef109ac809227badb258fbaa876e1905bb74b2b84575c945a27aeb86d371e41ef7855915fd34fc1a02e8eed8df8c5d3276367be307f906ae6edeaf4469b31e8e820ac7173cc79b5a363657b583a7a3a85feaa42e03ccac8f465327de41e5f66041f0f9bbc624b46c5608909ee33421a2a2e9c9e8406e721d6e8a0fc1b5555332ebbfa7cf35ede88915609515dff444849bbe09d7feec2212502676e7bb281a062f7d6bf26ee843112c3bf9e1ac1a469b0ad083ae69b3ca5a2f73d1d62c75a11bad6b7dbfa923554ff5e0801f22425f144afc0ed611a78dd463e05cefe26fa2b448881368c16e8bb9d06f69f3a7739785eb0c0643b6572d786700dbd920ebf9364c605796d6766688266513f894c49d3c386af2a30681130718b55c2e6c151c1c42a343d28de3735417a6c6efb2eeebdc755673181b1a9172de4885b401cb70c08f45141f9071630b2e944fac4dabee29147ee80197a2e16eb9cd4de6015309f8efbcb543a5a977b0c7dc166dd31bf6ba51f53f7db5a7da0ad3cf6babeefa31c474eeaa0a3da7ae9d01282ccf2cfd08c22ed169d687caa31a2cc2d1b243ff174d13bb167c1696844fe573c97d669c41ae3645e5bdf0a3e6bba13b1e0638a0ca701283ac616ba975fee426d29235e908f2bc131fd06ebab320636adcf206e01f3e06462804dab421a73b63cb1dc001520b3978a92064f665573914b4b30a3611d332ca699c371464525a458f49313bf4ac0d9ddf29f429a24b44a5a8bcc83047c13fa303ef1c21e3dd7b8268c981e4bf03f82a310e1030d4259b1e95f7041968c8165bae06e6095b383d05580739b72a1c08bcee61be2911d4902cc6d6fb349fde39ae47f224135093c6b578d4541b58c56ca174fbb86fef192bb363eadeb739ed40aa0a3cb2b1c2ddf3c2a84b374c2da7fbf0d2b20443561d7cb16c95824b8c8accf5e9a59e2224da518478545ae6a77738b7e91a49c326cba30d510a635cfc829e2f01abe1a4103cc432d9023a59436c5adc6bedcfddc7e388f4e787e7881cf4b164e354bd5643c880f97fbce64b64bbfc101e27f1fcc772cdb24b8745da078289a46a1809a708929332f560ce50d21ca3b678d34f026e93c52c1bbcbed357a2178b5d884d4978982bc5c5cafe284591be4d7a1497a9f546bed8724a382498078b0b93f37c9ceaa59505123c6a9b9e53d51d9e655d1482c33818df78f232ed777c6053c4d825b23839a4255b9b9970d7482c514e73371b694823e3e4ea71389a69b07401de2cc306bff2a216d9ca94af44b3c326574423a1267976a916a70cbcec100f6223674f84b1cc5dba417174a009b5f680487f91dea79e6a7aa863df9734edfa8fc3c073eda8ba7a252659174e77deadb653bcafe30c2fdec8fd6b1eb75b05e6a9947e7bc90cb5c31485f04b4ac51b3b6b1f61716f8b51abc3bbfe997876128c34be764cade59630b22387883dc76e615abbf063a9cdb2392d0098c1e49f5017e37cc50053ba98be50a5c7c514b6375bcb420069db0208b7ccaa1d664cd7e75254c9b9"}, 0x1039) r1 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r1, &(0x7f0000001440)=ANY=[@ANYBLOB="29705a0975cd9f49f33f6d7584d5d33ef25fb898daa09f7605"], 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) write(r1, &(0x7f00000012c0)="e050ae4f51a71a94991358932073bf9601294c38a8e9b3feb3da9fa00ca559dd604757f9821b6067159aa2a6b57a15152b1319a82db7eaedea9bf77a794b465f127b183faec1d98e433bc2f304a606aa6376d1305f2cd5f7e442efba37a1930f1f09276dc81a43ffcb2c27dca7b4738744051cc00a3de7c144a98947a11fa6d9c2bb77789a8c192286c8ead581c49e180fd9625cf60e4351912b1ee4f6113b0d520db976ea4e369ff2748757afa9876d45981287971209d7e7562d08248421e30c89f78672e4d79165139cbca3ab5f15d17418fcf660b417659ed46f5efb258962b2003c588e3b201d59e7643791", 0xee) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001400)={&(0x7f00000013c0)='./file0\x00', 0x0, 0x10}, 0x10) r2 = dup3(r0, r0, 0x80000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000001280)={&(0x7f00000000c0), 0xc, &(0x7f0000001240)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0200dbdf250800000018000300140002006e723000000000000000000000001000"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 14:44:41 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x7, 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xe02e]}}, 0x1c) geteuid() 14:44:41 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000100)={r2, r3+10000000}) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x28000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000000200)={{0x2, 0x226}, {0x6, 0x73}, 0xffff, 0x1, 0x5}) 14:44:42 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x111002, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x7) connect(r0, &(0x7f0000000200)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x8, @rand_addr="b4394df1a933dce724a57de458772c65"}}, 0x80) chmod(0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:42 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x7, 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:42 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000100)={r2, r3+10000000}) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x28000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r4, 0xc0505350, &(0x7f0000000200)={{0x2, 0x226}, {0x6, 0x73}, 0xffff, 0x1, 0x5}) 14:44:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) r0 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) timer_settime(0x0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x80400, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000380)={0x1}) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) recvmmsg(r2, &(0x7f0000004740)=[{{&(0x7f0000000040)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/39, 0x27}], 0x1, &(0x7f00000001c0)=""/185, 0xb9}, 0xffff}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000280)=""/60, 0x3c}, {&(0x7f0000000400)=""/175, 0xaf}, {&(0x7f0000000640)=""/228, 0xe4}], 0x3, &(0x7f0000000300)=""/2, 0x2}, 0xc}, {{&(0x7f0000000740)=@nl=@proc, 0x80, &(0x7f0000000580)=[{&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/128, 0x80}, {&(0x7f00000004c0)=""/36, 0x24}, {&(0x7f0000000840)=""/67, 0x43}], 0x4}, 0x5}, {{&(0x7f00000008c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000940)=""/127, 0x7f}], 0x1, &(0x7f0000000a00)=""/145, 0x91}, 0x80000000}, {{&(0x7f0000000ac0)=@nfc, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000b40)=""/132, 0x84}], 0x1, &(0x7f0000000c40)=""/225, 0xe1}, 0x6}, {{&(0x7f0000000d40)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000dc0)=""/161, 0xa1}, {&(0x7f0000003580)=""/4096, 0x1000}, {&(0x7f0000000e80)=""/123, 0x7b}, {&(0x7f0000000f00)=""/194, 0xc2}], 0x4, &(0x7f0000001040)=""/197, 0xc5}, 0x9}, {{&(0x7f0000001140)=@nfc, 0x80, &(0x7f00000012c0)=[{&(0x7f00000011c0)=""/193, 0xc1}], 0x1, &(0x7f0000001300)=""/60, 0x3c}}, {{&(0x7f0000001340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000004700)=[{&(0x7f00000013c0)=""/172, 0xac}, {&(0x7f0000001480)=""/13, 0xd}, {&(0x7f00000014c0)=""/177, 0xb1}, {&(0x7f0000004580)=""/197, 0xc5}, {&(0x7f0000004680)=""/89, 0x59}], 0x5}}], 0x8, 0x23, &(0x7f0000004840)) 14:44:42 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x400001, 0x39) ioctl$RTC_AIE_ON(r0, 0x7001) r1 = socket$caif_seqpacket(0x25, 0x5, 0x800000000200005) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="57ba70b2dfa6fc6121a7b3d2653c0db53f0bb6a597a40c8192b405ab7a93f5543b8044809cb1874f74e82accb99d3e11b414a934c29690d5649147b0ba3431366850781d1441", @ANYRES16=r2], 0x38) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:42 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) chmod(0x0, 0x0) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) r2 = socket$nl_crypto(0x10, 0x3, 0x15) recvfrom(r2, &(0x7f0000000040)=""/40, 0x28, 0x0, &(0x7f0000000200)=@isdn={0x22, 0x6090d1c4, 0x5ab, 0x5, 0x1f}, 0x80) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:44:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xe803]}}, 0x1c) geteuid() 14:44:42 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x7, 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:42 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000100)={r2, r3+10000000}) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x28000, 0x0) 14:44:42 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x80000000, 0x10, 0x1, r1}) dup3(r0, r1, 0x80000) 14:44:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xf401]}}, 0x1c) geteuid() 14:44:42 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:42 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x100) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRES16=r1], 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:42 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000100)={r2, r3+10000000}) 14:44:42 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x80000000, 0x10, 0x1, r1}) dup3(r0, r1, 0x80000) 14:44:42 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_settime(0x0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80, 0x0) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:42 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:42 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x7, &(0x7f0000000100)={r2, r3+10000000}) 14:44:42 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) modify_ldt$write(0x1, &(0x7f0000000080)={0x20, 0x20100800, 0xffffffffffffffff, 0xf32, 0x4, 0x401, 0x9, 0xffffffffffffffa2, 0xff3a, 0x7ff}, 0x10) setsockopt$inet6_int(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xfc00]}}, 0x1c) geteuid() 14:44:42 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0x80000000, 0x10, 0x1, r1}) dup3(r0, r1, 0x80000) 14:44:42 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:42 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) clock_gettime(0x0, &(0x7f0000000000)) [ 1886.742902][ C1] net_ratelimit: 1 callbacks suppressed [ 1886.742913][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:42 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:43 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) 14:44:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) r0 = getpid() timer_create(0x2, &(0x7f0000000500)={0x0, 0x2, 0x0, @tid=r0}, &(0x7f0000000540)=0x0) clock_gettime(0x7, &(0x7f0000000100)) timer_settime(r1, 0x1, &(0x7f00000005c0)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, &(0x7f0000000040)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:43 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:43 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) memfd_create(&(0x7f0000000040)='#! ', 0x4) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x2386, 0x208001) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000180)={0x10000, 0xd000, 0x0, 0x921, 0xff}) write$P9_RLERROR(r2, &(0x7f00000000c0)={0x2b, 0x7, 0x2, {0x22, 'wlan1)#eth0proc(proc]eth0mime_type'}}, 0x2b) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xfe80]}}, 0x1c) geteuid() 14:44:43 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:43 executing program 0: r0 = memfd_create(&(0x7f0000000040)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:43 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 14:44:43 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:43 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:43 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 14:44:43 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = socket(0x1f, 0x800, 0x1) recvfrom$inet(r1, &(0x7f0000000040)=""/152, 0x98, 0x2040, &(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) execveat(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x1000) 14:44:43 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:43 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4abf7f8ce69e6f20, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000040)) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xfec0]}}, 0x1c) geteuid() 14:44:43 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 14:44:43 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x8) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=""/123, 0x7b) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000200)={{0x1000, 0x200, 0xfffffffffffffbff, 0x3, 0x8}, 0x7fffffff, 0x9, 0x7fffffff, 0xa7, 0x1, "d6d483c3e888867b78bf45883578829df5149213649b1b27d4075ba951b7be36c04e9ba6b25b40fe481a8ae743102f81cc1dfc883074a3ec6e57e3ae8f5ba97fa5f00fd4a2e5640023424d9b4abe4e91c307e40c10cb089d54c42134bf7faf8aef5a6f8e803fad4b8b3b00ec110b19568ef17cd7cc41f47c8731f2eace1946df"}) 14:44:43 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:43 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:43 executing program 5: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r0, 0x80000) 14:44:43 executing program 2: write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:43 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:43 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20000, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x8) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)=""/123, 0x7b) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000200)={{0x1000, 0x200, 0xfffffffffffffbff, 0x3, 0x8}, 0x7fffffff, 0x9, 0x7fffffff, 0xa7, 0x1, "d6d483c3e888867b78bf45883578829df5149213649b1b27d4075ba951b7be36c04e9ba6b25b40fe481a8ae743102f81cc1dfc883074a3ec6e57e3ae8f5ba97fa5f00fd4a2e5640023424d9b4abe4e91c307e40c10cb089d54c42134bf7faf8aef5a6f8e803fad4b8b3b00ec110b19568ef17cd7cc41f47c8731f2eace1946df"}) 14:44:43 executing program 5: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r0, 0x80000) 14:44:43 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r2 = fcntl$dupfd(r0, 0x406, r0) prctl$PR_MCE_KILL_GET(0x22) getdents64(r2, &(0x7f0000000000)=""/1, 0x1) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xff00]}}, 0x1c) geteuid() 14:44:43 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:43 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x4) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000240)=0x3) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}, {0x2, 0x4e20, @rand_addr=0x9}, 0x95, 0x0, 0x0, 0x0, 0x400, &(0x7f0000000080)='sit0\x00', 0x400, 0x3, 0x8}) r2 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000001580), 0x800) clock_gettime(0x0, &(0x7f00000015c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000001600)={r3, r4/1000+30000}, 0x8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x1) 14:44:43 executing program 5: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r0, 0x80000) 14:44:43 executing program 3: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:44 executing program 5: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) [ 1887.874402][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:44 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:44 executing program 3: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xff0f]}}, 0x1c) geteuid() 14:44:44 executing program 5: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) 14:44:44 executing program 2: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:44 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3d5bed8a7bbbc62b) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0xffffffffaa9ced86, 0xf, 0xfffffffffffffc00, 0x0, "02af50d302f2f3fcc26f4216df398eabd624686a7c547d94879b200c376c6559"}) 14:44:44 executing program 3: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:44 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x4) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB=')pZ\t'], 0x4) r1 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000240)=0x3) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}, {0x2, 0x4e20, @rand_addr=0x9}, 0x95, 0x0, 0x0, 0x0, 0x400, &(0x7f0000000080)='sit0\x00', 0x400, 0x3, 0x8}) r2 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000001580), 0x800) clock_gettime(0x0, &(0x7f00000015c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000001600)={r3, r4/1000+30000}, 0x8) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x1) 14:44:44 executing program 5: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) 14:44:44 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xffb8]}}, 0x1c) geteuid() 14:44:44 executing program 3: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:44 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) 14:44:44 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) 14:44:44 executing program 3: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:44 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:44 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) 14:44:44 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:44 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2, 0x0) ioctl$BLKBSZSET(r0, 0x40041271, &(0x7f0000000140)=0x3) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8002, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1ff, 0x101000) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f00000000c0)={0x8633e6948e6b8e69, 0xfffffffffffffffe, 0x0, 0x84000, r4}) dup3(r1, r2, 0x0) 14:44:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x20000]}}, 0x1c) geteuid() 14:44:44 executing program 3: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:44 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 14:44:44 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0aeafda39e4a00effdc5cf1c164a08ee491177224ac7c62f89e3aa8ff045"], 0x4) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:45 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) [ 1888.853351][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:45 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x408000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:45 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x27f60]}}, 0x1c) geteuid() 14:44:45 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) 14:44:45 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x408000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@nat={'nat\x00', 0x19, 0x3, 0x3f4, [0x20000640, 0x0, 0x0, 0x200007c4, 0x200007f4], 0x0, &(0x7f0000000200), &(0x7f0000000640)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff01000000110000002400000000f7687773696d300000000000000000000076657468315f746f5f7465616d0000006970366772657461703000000000000065727370616e30000000000000000000aaaaaaaaaaaaff00ffffffffffffffffffff29ffffffffff0000ac0000002401000054010000636f6e6e62797465730000000000000000000000000000000000000000000000180000000300000000000000c4630000000000000100000000000000736e6174000000000000000000000000000000000000000000000000000000000c000000aaaaaaaaaaaa0000fdffffff6c6f67000000000000000000000000000000000000000000000000000000000024000000bcacb1fb566740e331acda208fa568db848360f18053bc0b92a749f8bd1a2f00060000006172707265706c790000000000000000000000000000000000000000000000000c0000000000000000000000fdffffff00000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff020000001f0000000400000000000000000000000000000000000000000076657468305f746f5f626f6e640000006270713000000000000000000000000067726530000000000000000000000000668da5cf752e000000ff0000aaaaaaaaaabb00000000ffff000070000000d0000000400100006172707265706c790000000000000000000000000000000000000000000000000c000000ffffffffffff0000ffffffff6172707265706c790080000000000000000000000000000000000000000000000c000000aaaaaaaaaaaa0000ffffffff4e464c4f470000000000000000000000000000000000000000000000000000004c0000003000000001000600000000001b2c008424af1605103729ffdfd6a37d3eff4fb6f3eee83f30a9aacaba39e37ed4e926031c3df4c02c23c0aa7462d02a81741abc4e123af7806a5b7fb49cd995050000000600000088e77369743000000000000000000000000079616d3000000000000000000000000076657468305f746f5f626f6e640000007465616d5f736c6176655f300000000034035c1c2276ff0000ffffffaaaaaaaaaaaaff00ff0000ff0000a0000000a0000000d00000007265616c6d0000000000000000000000000000000000000000000000000000000c000000030000000700000000000000736e6174000000000000000000000000000000000000000000000000000000000c0000000180c20000000000ffffffff"]}, 0x444) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)=0x0) write$FUSE_LK(r1, &(0x7f00000001c0)={0x28, 0x0, 0x5, {{0x5c, 0x6, 0x1, r2}}}, 0x28) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f0000000040)={@empty, @initdev}, &(0x7f0000000080)=0x8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00005befdc)) r5 = syz_open_pts(r4, 0x20201) fcntl$setstatus(r5, 0x4, 0x2803) ioctl$TCXONC(r5, 0x540a, 0x0) write(r5, &(0x7f0000000080)='z', 0x1) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000040)=0xf) ioctl$TCFLSH(r4, 0x540b, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000002c0)={0x4}) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f0000000580)={0x7, 0x3}) readv(r5, &(0x7f0000000bc0)=[{&(0x7f0000000a40)=""/141, 0x8d}, {&(0x7f0000000480)}, {&(0x7f0000000b00)=""/126, 0x7e}, {&(0x7f00000004c0)=""/14, 0xe}, {&(0x7f0000000b80)=""/36, 0x24}], 0x5) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000300)={0x2f, 0x11, 0x12, 0x1b, 0x7, 0xfffffffffffffdf7, 0x0, 0x11a}) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) epoll_pwait(r3, &(0x7f0000000400)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000440)={0x2}, 0x8) 14:44:45 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:45 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:45 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x0, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) 14:44:45 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x408000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x50000]}}, 0x1c) geteuid() 14:44:45 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x0, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) [ 1889.364814][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:45 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:45 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x408000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) [ 1889.469700][ T8840] Unknown ioctl 21532 14:44:45 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x1000000]}}, 0x1c) geteuid() 14:44:45 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x0, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) [ 1889.648536][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:45 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x8000) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x15, 0xa8, &(0x7f0000000040)="966737f037200d7c78651cd14f4b8afb4d80917acfe2f8328e42bf599842e0e92694a215f01c3bb94807941442778754ce9f81b93565a94895c57ae36ca152dee5f2b766105b6b8280347d34ba0579e6be45fd34d798b221d910f6781be28cdc6aae54ca19fb09ed6bbd0bbce37b0fe6515760f5fc52ef37fd5710b44c83855e6ba4ac7c5d939fd7f18761b2043e33deec74f2ebf32b63e8ed4daa44c0590e9cd0bd9deb9697f0d3"}) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:45 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:45 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x408000) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) 14:44:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x2000000]}}, 0x1c) geteuid() 14:44:45 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:45 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) [ 1889.852343][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:46 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) 14:44:46 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x408000) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) 14:44:46 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:46 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:46 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80000) 14:44:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x3000000]}}, 0x1c) geteuid() [ 1890.158923][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:46 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) sendfile64(r0, r0, &(0x7f0000000080), 0x1) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$peekuser(0x3, r2, 0x4a) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x110) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:46 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:46 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x408000) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) 14:44:46 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r1, 0x80000) 14:44:46 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x4000000]}}, 0x1c) geteuid() 14:44:46 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:46 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r1, 0x80000) 14:44:46 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) [ 1890.391805][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:46 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:46 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x0, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:46 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)=0x2) 14:44:46 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:46 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(0xffffffffffffffff, r1, 0x80000) 14:44:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x5000000]}}, 0x1c) geteuid() 14:44:46 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x0, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:46 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)=0x2) 14:44:46 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1890.751157][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:46 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x0, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:46 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, 0xffffffffffffffff, 0x80000) 14:44:47 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)=0x2) 14:44:47 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, 0xffffffffffffffff, 0x80000) 14:44:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x6000000]}}, 0x1c) geteuid() 14:44:47 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) [ 1891.078088][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000000)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:47 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:47 executing program 0: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:47 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, 0xffffffffffffffff, 0x80000) 14:44:47 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:47 executing program 0: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x60e8d83]}}, 0x1c) geteuid() 14:44:47 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:47 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:47 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:47 executing program 0: r0 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:47 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x7000000]}}, 0x1c) geteuid() 14:44:47 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)=0x2) 14:44:47 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:47 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) modify_ldt$write(0x1, &(0x7f0000000080)={0x3, 0x20000800, 0x1000, 0xa1ed, 0x8, 0x3, 0xfff, 0x8, 0x8, 0x1}, 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:47 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="09a5dcb0d6e11f3d00b42a4fe766ea58f98860846e6ed718c5ad4e830b0a"], 0x1e) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:47 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)=0x2) 14:44:47 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:47 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) modify_ldt$write(0x1, &(0x7f0000000080)={0x3, 0x20000800, 0x1000, 0xa1ed, 0x8, 0x3, 0xfff, 0x8, 0x8, 0x1}, 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) 14:44:48 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x8000000]}}, 0x1c) geteuid() 14:44:48 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) [ 1891.986588][ C0] net_ratelimit: 1 callbacks suppressed [ 1891.986599][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:48 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0xffffffffffffff7b) fcntl$setstatus(r2, 0x4, 0x42400) sendto$unix(r2, &(0x7f0000000040), 0xfffffe9f, 0x0, 0x0, 0xfffffffffffffe44) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) 14:44:48 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)=0x2) 14:44:48 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x40000000000000) 14:44:48 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) 14:44:48 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:48 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) 14:44:48 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) 14:44:48 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x9000000]}}, 0x1c) geteuid() 14:44:48 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)) 14:44:48 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1892.326086][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:48 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) 14:44:48 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000740)={&(0x7f0000000700)=[0x1], 0x1, 0x6, 0x5, 0x2, 0x401, 0x2, {0x8, 0x5, 0x1c000000000, 0x2, 0x0, 0x6, 0x8001, 0x40, 0xff, 0x2, 0x2, 0xfffffffffffffffc, 0x7000000, 0x1000, "066917543942747a9df88722204e5b6772f8f19497e1ad6e8eb9d13c7173b513"}}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40080, 0x0) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000001c0)="7ba561d913d70342c14b84ac45af56cd3826ddc80f1211a50f40c043672f6cafc10be5c9dab3bddadc15a822cf605fc898260059a2654992a1835fa6ee5e76fbe540987b01e8ea2a669fb99a49c04f8b0c0b52a163aeb87f379c356f3b3fa5cb535e2044c78557f50020032d5c70c436e3ef8d84aa835cd202bfff0b60b5cf9669b7092b858eae6a8708906ef4a7b00896f0f39734bd78e2414921158ffb9b91", 0xa0, 0x0) r4 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r3, &(0x7f00000004c0)=[{&(0x7f0000000280)="7be41493fd85710b8036580c806c33968f36b827c4854ac93079c9658626ca746f9a7bc1b6d0ca4dcd8fbace4f380f8f1d8b7bda1ba31f3d5ffb295ed19f67baa83035e4745c84f841ad3fee8328805c8b0f0e9436f42e37c64218abccccc0812edddb0c1df740be068e6a521db6062d792c8a873d9fc3875510457da7f3e21c7826e4cba497c233890788f3d81f", 0x8e}, {&(0x7f0000000400)="6c1bab1435e6abf9c53e8ef47397a4466f2b4869c6f7e6a5946788f93e918cd122018f4b3e308dd8a1a47362ff1e5c89e9ea8cad6cbd148423428c9810d7e28db5df4c277bd3bc84befb80837fec20dd7bfccdba991ad128152ec6bea349ff32357f9ada8d626661e8c55ea79d3a4075b7cfe973dcd3d8f3087a133c5400cdd2ca5d62f105f82d10d7dae94262", 0x8d}, {&(0x7f0000002580)="96f3f1dd4e384292bac81e162765af08ffe4c0b6e1229e290955ed396d9134166fdae8175d961b30127a664351f493aae5dc385851a0747656fc17e603742ee05965025dac9c7492b06f9a1b72057e9caf34842ed45d98889dbe95e6336e76d603fba3ab2d7e2d35e4ffecb2d35953f8c45861667645cc5d866e74baeca31188df2b87857d5ca70a702d6106e1dcfa9ce6ead0aa42dacfeae856b20ca68340e39e5a276d134e439f7eb0e434a6674dc939aaf572764770d25fff5735bbdf3741564e064c811e380517607fdf2a6d4a96d8613d66359b02bc527bce8059ed0a4fbd428bec7cf0101ee120629417d979e6410b2e0ab8a3592fe9099a1769b1719108ad4cef76af7c89e3da9ae84ec3615b8100abfa08d4c7f1fc41d1ae841b0d601196d5b44d15df160c4b9e0e4efd8cd0a74ad28ce243669859bb763be4df7077bf79d9beca5c21aacf627c841a9a046499802a88a875cded5b15f6c0e6e675181771eb55f9212a28436c0ecef6c38b0152de1746ca6bde295f42d18c198d02842da8ccbeea6e877a9c75f19c3a492e219773617cb4b523e9221bf92dc7630bd877f307c8ea01e05d543a736912d3fc6d6e2598c7309aa454e4fb57d717c2e074ae044f8d34a9d0785a52d777cb496ca45d02633b332d18fd44a554f276ceb4b9c120ca045e1c419623da740c11e5be2c504d8dca1d0ac9b1c2548262b2736263d0ceb89ac7cc287c7176a1abee4c3f277154d5c8c332343a85635d19d46ea0dc584fba4414dafcdc1fc3ff74f8844d43e0ab716216b376c8dc6af23c498f7344a091bdae60ba376e126cf8cb3bb1b13ad5226bdeb7f76df885b8a5df2fa5849a588a5d78c1eb0787b67a2c1d2696ef74fdd827cd77984b347e30a57b602ad9fadc3af675dce69bf1a3c5852280ac38e86066011e5e5ee4dd77b45bf511682a878799d10d192947d459bd376c3345ffbb0dfc22dc25838a7e1cea21a7d789aa006811d1c6465ed08854d1ae2a316bbba4cc0f6ac5d3010757e6ce0cc41addd14ccfe588e098db38882aa6ac35cf716b9ba492cb0dde2d0629ecd6e71b9052c95c8778baa11960a94761a78929ca003c9b0ec6402ee2389e877cc9ab5c8b268e957577a157e7fb384b9a044388871f05783d95b5efe016964f58ed43596202d30b866b98ed5226d257e83ffe0915c276b54fce9b7551b9ea2177ad84627cad42bae82212e18e338150d31fa0f4a29001069b0385664c88dc04c98729b13934f6010ad28c75e257af577f1c3ef479ecfa8145aec7d9b8437ef4ac1a016a02f024f7613a25cb7b8009b340f338758f15cdc308b1227a83e617a3e94f7e1d53a85d172cf8511bfe50accdea2ab8176a628afcdf80589b3225882fca255ec7b733efe94d98ce55335a7ba4ccd86b470e48ff68bf31613c95bbc45aa424d47399da49e28eac5ab50ebf8a5b64603ffaee8dbf37821f40eb3bbdb58e43b87fa0ecab74eba05d5374d8b3b0f9d9544077a5f8caeb97d9b2d485fff97df1eef7b9563bd9c7990899130c22adba2acdfa553f202f24581436b5f71bd895ac6ba2b17d782646830869634279365b97195873aebbd4b40ebeebd514c36d06b331397563426d595555489a404965fcc7c9fc21368777d6ad7b34a32859208cc172598784ed319a12025d2793f0b19161a4e53d1bb42bf91acd18dcc3e8798e6ce6d3681b14b0264e662ae3658b6ecd1d156da5b3421d5bef54c5c9b349852afd8fa61842445d6637d5f53582cd162cf55048df73ef1b504f4eb72db41838f25828cd7cb038d08602913f7b65dd8f1e18db9007b8989556deb0888038993da74585071683998d284953e687490c450960f1e3b00ba74f40fa0b222675e00b97c7e6195a54774499d01fb94bafbd8823239d24c62bc1d67d5964157840124b9a9011e88ba7087db69d13b54f16a0633a3c35946cb1ba14340dc3374b9ce101b3254375e4993c50492bb015d2d04c0e080af6b9c19568bbabef0b4529b1d798beea0a225e240992fd42456987cafab108cbc07c6e4afaa28068ae78afe17e11293fe60662ea5e6e141c2caea70f44384cae0cda76f81d1b4b29d4cd776c428f375547c7a6d9aa44272d7cc9a82163a004463c841f053cc5a215feaead7801c2c246f6bb4ad097e77d8a741932adbecc79e6919e5d917dfbd937240bc2617c80796e96f9e3b016b0c24f30cc87d0e46728d1fe9d71780d956ca8a1ef18acd23b102ebeb89ae3fb919cd9c9615681f184d870322d27a353df03cb325c4f0674182c48f710bea174a4652ab41a2438cb6eb0facf0bd718664000d6defef00dcb2fa6f3bbd6811726a5b49260380ffe4ddada0765ba1bdc6428e823de849ad1c9c9fff601b010fd6e3055b3891e514b5e92c38be560617f532eeb1279fa60a3a28f5d746d71f9e671412589d211ba2917d9a9429859b51dbe127dd20701c36a7d4aec7de8823db9667671a1726e0ec0d13e57005268fd2d5180f1a36120f20241ef6277a0c3080c37d7d8a57225429e2a9224672c33d6fefc91014aa351dc1b264c385fbaf9b97142a449406208704ecf4a9e8fdb3cac26cd719f1715f980d0550e64b87717dfb6d674cd429dd672e6c3fe3061769e2c8aff4be0eb91f7156fbae4dc003eafdd5f73dae2950aadc12c96933008d9ffc85637cb8216b33452bd7672b43501e68e70a68f8953bc6648fd53d58f98d66ce2286766a0c0b587aeef0ae4a2c020c00f9220fef908dc2934585aeded9d1bc8dbd1d4ec8abac8015f6497f923d474700769fc0accfec7c9110106ddcc9309da23b3fba64ee9c01dad9c2acafeecb87cf3f26e083e2de8d9d20f798555e336a917a67511657ce69b20e5598f286222b18d07bf4fc3360ce9eaedb349ba23f30e0e02aeb740861d2207c0af53d20b6e8f1e356d10ad2ef94a60215372fb453930f2d68c8ece1d0dd974b3de07a0e5568216566af59e1ce1be1ae3715a55a13c971d1c7c788acbf14b4f73a98645271cc16fc4727cd65504c3a4d43b33ca6e9e9b415b5a4d1207a0cd0f3eac0f01c701bcafdf06f91ab2e23a0537249e44b3d2735f9c0613372b43d5121a3864034e50714fddba044069210b09a074e255d4ee4863627224c92b652c30a9708636e4aed969507639163ed4ec3a2ad247f3f2e04b896ea9fce0abfdb8d6dd30add0886a8af14958af38ae21cf1cfb7604d264a7d358581a572b1cb283ab9cd9787c569346a686d7cac4ef9b38e77f781d1b0dc28430e035ab613c316c8c8d7d11be2895edf57f43d4401298d84b1e9a59966a6524addc47eae2b52fbcb5de6b40f0e3c777ea594dfd2f408c1b9a46f13507f34e53af67d75b98003cd3c05bd2d4d2f56544a454f3541dfdf133e97906ceed725bf3c06b5674c679a6e1decb2074938468580d83ffa48d740f111bdf894b9fdd03ade37d50a61130ac620b5a468956bbcab2293511d355d402b5bbd61969c67aec7dfc4f289aefd160377ac48451e29483cca7d73d54b9d3d92659c63ca08e0fe37730a11bf94fc97327aab09d867cf4d96fbc2ffd33509d1145b529b2bf45a6f44cb359b0f96fed36d0bf26e018c5f324b665785713600846e6db0589c616981f6f187a7261858cf1fa9c7e789bf18f7ec9ee2dea02a92805426e926a49a5c702b9a0f02592be0030467475e999454ee659161be48617ca8e02cc2e63c023268cdf1e5f6ab37a16dcac01f4d51a972aa4db5a6fb79b91a5e927c073a58cf8c5047347530c34db3b1ff8f499cdd8d95c0179282d7b04a2bfc40702323d1cb9ccb55b2f9a11cdc29b4e83c4fae62930f56019044d72efc3f2eec6457cb59b2a9253e8cea5ad9c9f471f5129645c5e90e33b5b426ecbfef0f495050bb6f74ebf812fc42702244f5b59a1e86505d63e688fcc9256379a36ac3203785ece4fe1394f67380cc242355e94722460ed8eb50d961844296d5df16390f94070340835edb43b8719d79c203fc53476904b8cbfabc47289bf8eb489a05a792b256ec56b8ed2da0738982acbaea6e1dc1f9e3f3ad10f51f402f9a05e41dfd04d41eb7abcfded213eb1307310a2c94d3a9ea5a7e017b76d3265f52a2ea2154ec32b7a11f1285aaed5bb901b18d8c31275b43d8563b58db2faf38b274d4673136b178ff264423e80ae5570185db9d27c79e66e732eff81449fb47d98410e4eb7e8c9b62fee1c7e481081dba90bf000c6ae22175187918fd7f73dc1faca99907b08cb30324ad0ecd6fcc698e3927896d574d02c2a8ad328da3d4827a6b1c36a6bbcc7ee50751c6b3daf0fa6deac6758940fd3a558a59d0401906d1d969809604a2efa79575430fa13149352074cc3c3c87304f485ebc97180e35e562b56f419ec8d3dcdeb1bcf8e3ba32adb870453148123dcc3f4425f6741973636cb7b68bfec9606d15e84e1c65c044db3f2104b77b09073210440b022a386b70844d318e9b0293f276cbd78362685add857afbb9310ea42a3150380a6249c02a693c441de0680081e872a2bb74653eb191de54e77ba88e1012838b2299896ca3af62f2847d448a7492e96548c6063ff1e301257eafbb8dd9fd0c718c059a38038773bb0d9278722c8a4494d95031f4a4af6d506b9896fa299080ca6d265ff2a419c85523c9ed8a60e48e35789830ad75af4694d11ee30b6ae18816a7c8541fd8296a29e551fda8b88408338f0ecd0361bba35df29b2749356d8e8376c5655835e51f84158c9d32afb43446df936a8e582a587af95015193130b54aa9b2191dac5123336568ce0f22ba52d91c7a04e5a796b2a10dbe44c8494876c1afa0a8572aaa455a145b720c47c57f2f4eca9bc5e542984994d604074cce71781eabfe6146162f80934bf3658070fa3d65bae5c342d71416b22ba251e4859593a7cab494d8b775ec51fc4fb745bbe2625d46849c73d4a99f9768172ed4e2a464ec2bfc658294dd328a5ae2732ee90f921c79615339b514ffec24fdbc5a72c59d7ff90f7ab72973d491924a1ff94fd4b4b2780bb70429f5557ceb684461a3c47649c283787709b03b804fab7e6e69c3400b38d071da68d86a2640441f2dd10d2120fe72a9230e653c65a327ea4c6a0a9d40e681cee66f0c98f17cd99ff5486176d48377fcf8c3469f21b52c940e48828bfe84a3138b971798ccb655f854ad0423293580d6bf012758b5a0adec6dbe9b7662e0e9dd879f7671969b8bb154a68206374cf08138aaa1e9d85db9d0d60e7b7a6bd8deac29c65b50c8b579bf94d496f0b17f2e59200a8da0158b9c0f77dcc3b1f9681f8fc409cc3d675b0381d789c6e49c85b1f520c116383a99fc19a5a0ca27c75476c9fb0d908663990f0cb48f210a0456399bbc760922d044258fa4cd257111e537b10c957e6b403a205a327ccb074e3be4af56771c79d2c165dce75b091d3c5ff2756b882f3edb3bcd757b7aeb4f559570d3f94e13d60c9eb260997275d68162f32748806ec0c50cad417acd2477b3a0e925e8aeb43062def74a74738dea0f0520ed9c4f5817be04b09775866f3a5452a47b3cf5b0fcfaba5f1e8c6cd08321f638e292526f19f3dce9d359fc42124bc8492fc297238c0e23ce3b7588fd61a9a1cb58bb81159b49fd76fb019b49252c74f68afd4cf9c0c986c49c69f7bdb36ab654c5ffe2ab8b6e5a43d557fe9e735291bf3a3a0963d088e9675b4746b905af285b9737c91abb0e3ea138e82718e8d3c5b5cce01a8e33c2570e8f8daecc86b4ea298c62d08cbb5e82a61a054a50cd4bc67a00788281d05", 0x1000}], 0x3, r4) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000040)={0x7, 0x3, @start={0x6}}) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) clock_nanosleep(0x7, 0x1, &(0x7f0000000680)={0x0, 0x989680}, &(0x7f00000006c0)) 14:44:48 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:48 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)) 14:44:48 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) 14:44:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xa000000]}}, 0x1c) geteuid() 14:44:48 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:48 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x2000) 14:44:48 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)) [ 1892.636706][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:48 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0xffffffffffffff7b) fcntl$setstatus(r2, 0x4, 0x42400) sendto$unix(r2, &(0x7f0000000040), 0xfffffe9f, 0x0, 0x0, 0xfffffffffffffe44) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) 14:44:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xe000000]}}, 0x1c) geteuid() 14:44:49 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) [ 1892.939688][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:49 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) fsync(r0) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x488100) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc044565d, &(0x7f0000000040)={0x4, 0xe, 0x4, 0x4, {}, {0x3, 0x9, 0x1ff, 0x4, 0x5, 0x20, "b6b11d8f"}, 0x6, 0x3, @fd, 0x4}) 14:44:49 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:49 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:49 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x4000) 14:44:49 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x0, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x10000000]}}, 0x1c) geteuid() [ 1893.132821][T11463] FAULT_INJECTION: forcing a failure. [ 1893.132821][T11463] name failslab, interval 1, probability 0, space 0, times 0 14:44:49 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1893.176492][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1893.188472][T11463] CPU: 0 PID: 11463 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #92 [ 1893.196518][T11463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1893.206580][T11463] Call Trace: [ 1893.209889][T11463] dump_stack+0x172/0x1f0 [ 1893.214240][T11463] should_fail.cold+0xa/0x15 [ 1893.218862][T11463] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:44:49 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) [ 1893.224699][T11463] ? ___might_sleep+0x163/0x280 [ 1893.229586][T11463] __should_failslab+0x121/0x190 [ 1893.234542][T11463] should_failslab+0x9/0x14 [ 1893.239068][T11463] kmem_cache_alloc_node_trace+0x270/0x720 [ 1893.244891][T11463] ? lock_acquire+0x16f/0x3f0 [ 1893.249581][T11463] ? ion_dma_buf_begin_cpu_access+0xd6/0x5d0 [ 1893.249620][T11463] __get_vm_area_node+0x12b/0x3a0 [ 1893.249641][T11463] __vmalloc_node_range+0xd4/0x790 [ 1893.265767][T11463] ? ion_heap_map_kernel+0xb7/0x420 [ 1893.270982][T11463] ? mutex_trylock+0x1e0/0x1e0 [ 1893.271002][T11463] ? ion_heap_map_kernel+0xb7/0x420 [ 1893.271023][T11463] vmalloc+0x6b/0x90 [ 1893.284950][T11463] ? ion_heap_map_kernel+0xb7/0x420 [ 1893.290177][T11463] ion_heap_map_kernel+0xb7/0x420 [ 1893.295233][T11463] ion_dma_buf_begin_cpu_access+0x188/0x5d0 [ 1893.301146][T11463] ? ion_dma_buf_end_cpu_access+0x4b0/0x4b0 [ 1893.307068][T11463] dma_buf_begin_cpu_access+0x7f/0x150 [ 1893.312547][T11463] dma_buf_ioctl+0x15f/0x1e0 [ 1893.317161][T11463] ? dma_buf_begin_cpu_access+0x150/0x150 [ 1893.322901][T11463] ? tomoyo_file_ioctl+0x23/0x30 [ 1893.327874][T11463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1893.334139][T11463] ? security_file_ioctl+0x93/0xc0 [ 1893.339275][T11463] ? dma_buf_begin_cpu_access+0x150/0x150 [ 1893.345041][T11463] __ia32_compat_sys_ioctl+0x197/0x620 [ 1893.350539][T11463] do_fast_syscall_32+0x281/0xc98 [ 1893.355592][T11463] entry_SYSENTER_compat+0x70/0x7f [ 1893.360724][T11463] RIP: 0023:0xf7f44869 14:44:49 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1893.364810][T11463] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1893.384435][T11463] RSP: 002b:00000000f5d400cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1893.392867][T11463] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000040086200 [ 1893.400862][T11463] RDX: 00000000200000c0 RSI: 0000000000000000 RDI: 0000000000000000 [ 1893.408856][T11463] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1893.416842][T11463] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:44:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x14000000]}}, 0x1c) geteuid() [ 1893.424829][T11463] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1893.436529][T11463] syz-executor.3: vmalloc: allocation failure: 88 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz3,mems_allowed=0-1 14:44:49 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) [ 1893.502264][T11463] CPU: 1 PID: 11463 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #92 [ 1893.510291][T11463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1893.510297][T11463] Call Trace: [ 1893.510328][T11463] dump_stack+0x172/0x1f0 [ 1893.510352][T11463] warn_alloc.cold+0x87/0x17f [ 1893.528010][T11463] ? zone_watermark_ok_safe+0x260/0x260 [ 1893.538204][T11463] ? rcu_read_lock_sched_held+0x110/0x130 [ 1893.543952][T11463] ? ion_dma_buf_begin_cpu_access+0xd6/0x5d0 14:44:49 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x200000) [ 1893.549955][T11463] ? __get_vm_area_node+0x2df/0x3a0 [ 1893.555176][T11463] __vmalloc_node_range+0x48a/0x790 [ 1893.560397][T11463] ? mutex_trylock+0x1e0/0x1e0 [ 1893.565181][T11463] ? ion_heap_map_kernel+0xb7/0x420 [ 1893.570393][T11463] vmalloc+0x6b/0x90 [ 1893.572824][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1893.574318][T11463] ? ion_heap_map_kernel+0xb7/0x420 [ 1893.574337][T11463] ion_heap_map_kernel+0xb7/0x420 [ 1893.595747][T11463] ion_dma_buf_begin_cpu_access+0x188/0x5d0 [ 1893.601658][T11463] ? ion_dma_buf_end_cpu_access+0x4b0/0x4b0 [ 1893.607575][T11463] dma_buf_begin_cpu_access+0x7f/0x150 [ 1893.613054][T11463] dma_buf_ioctl+0x15f/0x1e0 [ 1893.617657][T11463] ? dma_buf_begin_cpu_access+0x150/0x150 [ 1893.623393][T11463] ? tomoyo_file_ioctl+0x23/0x30 [ 1893.628351][T11463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1893.634605][T11463] ? security_file_ioctl+0x93/0xc0 [ 1893.639733][T11463] ? dma_buf_begin_cpu_access+0x150/0x150 [ 1893.645475][T11463] __ia32_compat_sys_ioctl+0x197/0x620 [ 1893.650958][T11463] do_fast_syscall_32+0x281/0xc98 [ 1893.655993][T11463] entry_SYSENTER_compat+0x70/0x7f [ 1893.656005][T11463] RIP: 0023:0xf7f44869 [ 1893.656017][T11463] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1893.656024][T11463] RSP: 002b:00000000f5d400cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1893.656037][T11463] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000040086200 [ 1893.656045][T11463] RDX: 00000000200000c0 RSI: 0000000000000000 RDI: 0000000000000000 [ 1893.656053][T11463] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1893.656062][T11463] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1893.656069][T11463] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:49 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20000, 0x10) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000100)=""/31) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x49b, 0x100000000, 0x0, 0x200}}) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x107a) 14:44:49 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) [ 1893.755629][T11463] warn_alloc_show_mem: 1 callbacks suppressed [ 1893.755635][T11463] Mem-Info: [ 1893.770700][T11463] active_anon:103316 inactive_anon:8377 isolated_anon:0 [ 1893.770700][T11463] active_file:1407 inactive_file:11479 isolated_file:0 [ 1893.770700][T11463] unevictable:0 dirty:176 writeback:0 unstable:0 [ 1893.770700][T11463] slab_reclaimable:14198 slab_unreclaimable:105766 [ 1893.770700][T11463] mapped:57203 shmem:8436 pagetables:4500 bounce:0 [ 1893.770700][T11463] free:464088 free_pcp:538 free_cma:0 [ 1893.867293][T11463] Node 0 active_anon:411712kB inactive_anon:33508kB active_file:4096kB inactive_file:42332kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:225264kB dirty:700kB writeback:0kB shmem:33744kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1893.900645][T11463] Node 1 active_anon:3808kB inactive_anon:0kB active_file:1532kB inactive_file:3584kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:3648kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1893.929297][T11463] Node 0 DMA free:15232kB min:220kB low:272kB high:324kB active_anon:368kB inactive_anon:0kB active_file:0kB inactive_file:144kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:16kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1893.958027][T11463] lowmem_reserve[]: 0 2553 2555 2555 [ 1893.963417][T11463] Node 0 DMA32 free:600412kB min:36232kB low:45288kB high:54344kB active_anon:411204kB inactive_anon:33508kB active_file:4072kB inactive_file:42188kB unevictable:0kB writepending:696kB present:3129332kB managed:2617996kB mlocked:0kB kernel_stack:11136kB pagetables:15964kB bounce:0kB free_pcp:2712kB local_pcp:1304kB free_cma:0kB [ 1894.004102][T11463] lowmem_reserve[]: 0 0 2 2 [ 1894.011557][T11463] Node 0 Normal free:24kB min:28kB low:32kB high:36kB active_anon:40kB inactive_anon:0kB active_file:24kB inactive_file:0kB unevictable:0kB writepending:4kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:0kB pagetables:64kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1894.043674][T11463] lowmem_reserve[]: 0 0 0 0 [ 1894.048485][T11463] Node 1 Normal free:1238620kB min:53624kB low:67028kB high:80432kB active_anon:3808kB inactive_anon:0kB active_file:1532kB inactive_file:3584kB unevictable:0kB writepending:4kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:672kB pagetables:1808kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1894.079628][T11463] lowmem_reserve[]: 0 0 0 0 [ 1894.084180][T11463] Node 0 DMA: 52*4kB (UME) 36*8kB (UME) 27*16kB (UME) 19*32kB (UME) 10*64kB (UE) 8*128kB (UE) 5*256kB (U) 3*512kB (UE) 3*1024kB (UME) 1*2048kB (E) 1*4096kB (U) = 15232kB [ 1894.101432][T11463] Node 0 DMA32: 4050*4kB (UME) 391*8kB (UME) 867*16kB (UME) 1733*32kB (UME) 23*64kB (ME) 17*128kB (UME) 14*256kB (UME) 27*512kB (UME) 151*1024kB (UM) 104*2048kB (UME) 31*4096kB (UM) = 604304kB [ 1894.120642][T11463] Node 0 Normal: 8*4kB (U) 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 32kB [ 1894.132576][T11463] Node 1 Normal: 651*4kB (UME) 284*8kB (UME) 221*16kB (UM) 56*32kB (UME) 116*64kB (UME) 65*128kB (UME) 29*256kB (UM) 20*512kB (UM) 159*1024kB (UME) 96*2048kB (U) 204*4096kB (UM) = 1238620kB [ 1894.132671][T11463] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1894.162137][T11463] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1894.172464][T11463] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1894.182140][T11463] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1894.191532][T11463] 21322 total pagecache pages [ 1894.196662][T11463] 0 pages in swap cache [ 1894.200948][T11463] Swap cache stats: add 0, delete 0, find 0/0 [ 1894.207112][T11463] Free swap = 0kB [ 1894.210836][T11463] Total swap = 0kB [ 1894.214648][T11463] 1965979 pages RAM 14:44:50 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:50 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x400000) 14:44:50 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:44:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x18020000]}}, 0x1c) geteuid() 14:44:50 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) 14:44:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x2d}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) [ 1894.218519][T11463] 0 pages HighMem/MovableOnly [ 1894.223195][T11463] 339406 pages reserved [ 1894.227490][T11463] 0 pages cma reserved [ 1894.258009][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:50 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:44:50 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) 14:44:50 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x2, &(0x7f00000000c0)=0x3) 14:44:50 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80ffff) 14:44:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x20000000]}}, 0x1c) geteuid() 14:44:50 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, 0x0, 0x0, 0x0, 0x1000) 14:44:50 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1}) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) [ 1894.523681][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:50 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x541b, &(0x7f00000000c0)=0x3) 14:44:50 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) 14:44:50 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0xffff8000) 14:44:50 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400080, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0xffffffffffffffff, 0x2, {0x0, 0x4, 0x9, 0x100000001}}, 0x20) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x480c0}, 0x1) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000280)={0x5ebd4ee, 0x4}) timer_settime(r3, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r4 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x8140) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f00000002c0)=0x2) fdatasync(r2) getdents(r4, &(0x7f0000001580)=""/4096, 0x1000) 14:44:50 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:44:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x40000000]}}, 0x1c) geteuid() 14:44:50 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 14:44:50 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) 14:44:51 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) [ 1894.818550][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:51 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x20000000000000) 14:44:51 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5421, &(0x7f00000000c0)=0x3) 14:44:51 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) 14:44:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x40020000]}}, 0x1c) geteuid() 14:44:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x200200, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x8) 14:44:51 executing program 2 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:51 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x40000000000000) 14:44:51 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)) [ 1895.146221][T13434] FAULT_INJECTION: forcing a failure. [ 1895.146221][T13434] name failslab, interval 1, probability 0, space 0, times 0 [ 1895.166014][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1895.233679][T13434] CPU: 0 PID: 13434 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1895.241719][T13434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1895.251788][T13434] Call Trace: [ 1895.255102][T13434] dump_stack+0x172/0x1f0 [ 1895.259463][T13434] should_fail.cold+0xa/0x15 [ 1895.264084][T13434] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1895.269927][T13434] ? ___might_sleep+0x163/0x280 [ 1895.274827][T13434] __should_failslab+0x121/0x190 [ 1895.279799][T13434] should_failslab+0x9/0x14 [ 1895.284331][T13434] kmem_cache_alloc+0x2b2/0x6f0 [ 1895.289217][T13434] ? ksys_write+0x1f1/0x2d0 [ 1895.293744][T13434] getname_flags+0xd6/0x5b0 [ 1895.298264][T13434] ? do_fast_syscall_32+0xd1/0xc98 [ 1895.303400][T13434] __ia32_compat_sys_execveat+0xd4/0x140 [ 1895.309096][T13434] do_fast_syscall_32+0x281/0xc98 [ 1895.314158][T13434] entry_SYSENTER_compat+0x70/0x7f [ 1895.319280][T13434] RIP: 0023:0xf7f71869 14:44:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x54000000]}}, 0x1c) geteuid() 14:44:51 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x80ffff00000000) [ 1895.323365][T13434] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1895.343070][T13434] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1895.351500][T13434] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1895.359491][T13434] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1895.367492][T13434] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1895.367501][T13434] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:44:51 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5450, &(0x7f00000000c0)=0x3) 14:44:51 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)) [ 1895.367509][T13434] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:51 executing program 2 (fault-call:2 fault-nth:1): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:51 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) write$binfmt_aout(r2, &(0x7f00000001c0)={{0x1cf, 0x4c25c121, 0x4, 0xbc, 0x109, 0xe0000000000000, 0x302, 0x2516}, "a9c78557c470ad723dea0ecd70b70f7e375ba14b3772d0607449674effd58e832507bb1048624b4ab8e6f344be8df727c2ae206ab1798299e025e3182ebcc8e2a34c7f5be945a32ed3f4582bf1cf254720dd627c6396954f7ea6d755ce3c92506d55da7c959bf5b8e7cbb18501dd1f9a3fffddf11c25362f8371650f06a77c31450bdf0abb6a58a66ff766ce66f8eb7b7180df5a7bb888772bc2d6e390cd8a916e0188ebb9f11a0e0706d6826aaa2df3a6e662d89d9e57858cf3cda958eff76c70c0738578b380d8b58c7ccafe77aa66", [[], [], [], []]}, 0x4f0) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x8, &(0x7f0000ffb000/0x2000)=nil, 0xc0000000}) getgroups(0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0x0]) r4 = getegid() r5 = getgid() setgroups(0x3, &(0x7f0000000080)=[r3, r4, r5]) 14:44:51 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)) [ 1895.635788][T14039] FAULT_INJECTION: forcing a failure. [ 1895.635788][T14039] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1895.649042][T14039] CPU: 1 PID: 14039 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1895.657030][T14039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1895.667106][T14039] Call Trace: [ 1895.670421][T14039] dump_stack+0x172/0x1f0 [ 1895.674765][T14039] should_fail.cold+0xa/0x15 [ 1895.679377][T14039] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1895.685205][T14039] ? __lock_acquire+0x548/0x3fb0 [ 1895.690163][T14039] ? find_held_lock+0x35/0x130 [ 1895.694948][T14039] should_fail_alloc_page+0x50/0x60 [ 1895.700172][T14039] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1895.705735][T14039] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1895.711469][T14039] ? find_held_lock+0x35/0x130 [ 1895.716259][T14039] ? kasan_check_write+0x14/0x20 [ 1895.721222][T14039] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1895.727058][T14039] cache_grow_begin+0x9c/0x860 [ 1895.731853][T14039] ? getname_flags+0xd6/0x5b0 [ 1895.736629][T14039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1895.742905][T14039] kmem_cache_alloc+0x62d/0x6f0 [ 1895.747777][T14039] ? ksys_write+0x1f1/0x2d0 [ 1895.752290][T14039] getname_flags+0xd6/0x5b0 [ 1895.756802][T14039] ? do_fast_syscall_32+0xd1/0xc98 [ 1895.761931][T14039] __ia32_compat_sys_execveat+0xd4/0x140 [ 1895.767581][T14039] do_fast_syscall_32+0x281/0xc98 [ 1895.772630][T14039] entry_SYSENTER_compat+0x70/0x7f [ 1895.777767][T14039] RIP: 0023:0xf7f71869 14:44:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x607f0200]}}, 0x1c) geteuid() [ 1895.781853][T14039] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1895.801465][T14039] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1895.809889][T14039] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1895.817904][T14039] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1895.825897][T14039] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:44:52 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, 0x0) 14:44:52 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5452, &(0x7f00000000c0)=0x3) 14:44:52 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) ftruncate(r0, 0x401) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000040)) 14:44:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x648e4566]}}, 0x1c) geteuid() [ 1895.833971][T14039] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1895.842161][T14039] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:52 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:52 executing program 2 (fault-call:2 fault-nth:2): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:52 executing program 0 (fault-call:2 fault-nth:0): r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x66458e64]}}, 0x1c) geteuid() [ 1896.043810][T14566] FAULT_INJECTION: forcing a failure. [ 1896.043810][T14566] name failslab, interval 1, probability 0, space 0, times 0 14:44:52 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5460, &(0x7f00000000c0)=0x3) 14:44:52 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x200000, 0x0) write$FUSE_INIT(r0, &(0x7f00000001c0)={0x50, 0x0, 0x1, {0x7, 0x1d, 0x0, 0x200, 0x8000, 0x7, 0xfffffffffffffffc, 0x1f}}, 0x50) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r3 = dup3(r2, r2, 0x0) setsockopt$inet_int(r3, 0x0, 0x1f, &(0x7f0000000000), 0x4) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000080)={0x81, [0x7, 0xff, 0x4, 0x0, 0x1, 0x3, 0x19, 0x8, 0x1e, 0x8001, 0x6, 0xebc, 0x516, 0x4, 0x4, 0x1, 0x92, 0x31e4000000000000, 0x3, 0x0, 0x43, 0x485, 0x4, 0xfffffffffffffffa, 0x7f, 0x5, 0x1, 0x0, 0x2, 0x9, 0x5, 0xffff, 0x9, 0x5dc, 0x0, 0x7da, 0x6, 0x2, 0x1f, 0x2, 0x6, 0x3ff, 0x2, 0x2, 0x6, 0x3eea, 0x80], 0x7}) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000100)=0x1, 0x4) [ 1896.102052][T14566] CPU: 1 PID: 14566 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1896.110242][T14566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1896.120315][T14566] Call Trace: [ 1896.123645][T14566] dump_stack+0x172/0x1f0 [ 1896.128005][T14566] should_fail.cold+0xa/0x15 [ 1896.132622][T14566] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1896.138456][T14566] ? ___might_sleep+0x163/0x280 [ 1896.143330][T14566] __should_failslab+0x121/0x190 [ 1896.148287][T14566] should_failslab+0x9/0x14 [ 1896.152816][T14566] kmem_cache_alloc_trace+0x2d1/0x760 [ 1896.158209][T14566] ? lock_downgrade+0x880/0x880 [ 1896.163105][T14566] alloc_fdtable+0x86/0x290 [ 1896.167645][T14566] dup_fd+0x743/0xb30 [ 1896.171671][T14566] unshare_fd+0x160/0x1d0 [ 1896.176039][T14566] ? set_max_threads+0xe0/0xe0 [ 1896.180836][T14566] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1896.180860][T14566] unshare_files+0x7f/0x1f0 [ 1896.180881][T14566] ? should_fail+0x1de/0x852 [ 1896.195681][T14566] ? __ia32_sys_unshare+0x40/0x40 [ 1896.195701][T14566] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1896.195724][T14566] __do_execve_file.isra.0+0x27e/0x23f0 [ 1896.195740][T14566] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1896.195756][T14566] ? __phys_addr_symbol+0x30/0x70 [ 1896.195769][T14566] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1896.195784][T14566] ? __check_object_size+0x3d/0x42f [ 1896.195806][T14566] ? copy_strings_kernel+0x110/0x110 [ 1896.195818][T14566] ? strncpy_from_user+0x2a8/0x380 [ 1896.195837][T14566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1896.195857][T14566] __ia32_compat_sys_execveat+0xf3/0x140 [ 1896.195877][T14566] do_fast_syscall_32+0x281/0xc98 [ 1896.206701][T14566] entry_SYSENTER_compat+0x70/0x7f [ 1896.206715][T14566] RIP: 0023:0xf7f71869 [ 1896.206730][T14566] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1896.206739][T14566] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 14:44:52 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:52 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40049409, &(0x7f00000000c0)=0x3) [ 1896.206754][T14566] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1896.206763][T14566] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1896.206771][T14566] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1896.206778][T14566] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1896.206784][T14566] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:52 executing program 4: ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000400)={0x6, 0x9}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(r0, 0x1, &(0x7f00000005c0)={{r1, r2+30000000}, {0x0, 0x989680}}, &(0x7f0000000600)) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xd7, 0x200) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r3, 0xc0305615, &(0x7f0000000100)={0x0, {0x9, 0x69d0}}) ioctl$TCSBRKP(r3, 0x5425, 0x33e5a9d9) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) prctl$PR_GET_NO_NEW_PRIVS(0x27) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000440)=0x9, 0x4) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0xfffffe07) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x214000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f0000000080)={r5, 0x1}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x5, 0x2, 0x3ff, 0x7, 0x0, 0x80000001, 0x800, 0x7, 0x1, 0x7, 0x9, 0xffffffffffff3b7a, 0xfffffffffffffff7, 0x1, 0x0, 0x2, 0x0, 0x64, 0x5, 0x80000000, 0x1, 0xffff, 0xffffffffffffff7f, 0xe8, 0x4, 0x5, 0x7, 0x4, 0x8, 0x0, 0x6, 0x100000000, 0x9, 0x14, 0x6, 0x3, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000200), 0xe}, 0x2, 0x3, 0x11d30684, 0x1, 0x8, 0x100000001, 0x4}, r6, 0xb, r4, 0x1) clock_settime(0x7, &(0x7f0000000300)={0x77359400}) 14:44:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x838d0e06]}}, 0x1c) geteuid() 14:44:52 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:52 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x2, &(0x7f0000000000)=0x2) 14:44:52 executing program 2 (fault-call:2 fault-nth:3): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:52 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x4008620b, &(0x7f00000000c0)=0x3) [ 1896.558087][T15188] FAULT_INJECTION: forcing a failure. [ 1896.558087][T15188] name failslab, interval 1, probability 0, space 0, times 0 14:44:52 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x541b, &(0x7f0000000000)=0x2) [ 1896.664522][T15188] CPU: 0 PID: 15188 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1896.672546][T15188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1896.682632][T15188] Call Trace: [ 1896.685951][T15188] dump_stack+0x172/0x1f0 [ 1896.690309][T15188] should_fail.cold+0xa/0x15 [ 1896.694927][T15188] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1896.700846][T15188] ? ___might_sleep+0x163/0x280 [ 1896.705732][T15188] __should_failslab+0x121/0x190 [ 1896.710693][T15188] should_failslab+0x9/0x14 [ 1896.715225][T15188] kmem_cache_alloc_trace+0x2d1/0x760 [ 1896.720614][T15188] ? lock_downgrade+0x880/0x880 [ 1896.725491][T15188] alloc_fdtable+0x86/0x290 [ 1896.730013][T15188] dup_fd+0x743/0xb30 [ 1896.734038][T15188] unshare_fd+0x160/0x1d0 [ 1896.738387][T15188] ? set_max_threads+0xe0/0xe0 [ 1896.743158][T15188] ? find_held_lock+0x35/0x130 [ 1896.747928][T15188] ? cache_grow_end+0xa4/0x190 [ 1896.752708][T15188] unshare_files+0x7f/0x1f0 [ 1896.757229][T15188] ? __ia32_sys_unshare+0x40/0x40 [ 1896.762282][T15188] __do_execve_file.isra.0+0x27e/0x23f0 [ 1896.767842][T15188] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1896.774105][T15188] ? __phys_addr_symbol+0x30/0x70 [ 1896.779144][T15188] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1896.784870][T15188] ? __check_object_size+0x3d/0x42f [ 1896.784895][T15188] ? copy_strings_kernel+0x110/0x110 [ 1896.784909][T15188] ? strncpy_from_user+0x2a8/0x380 [ 1896.784930][T15188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1896.795405][T15188] __ia32_compat_sys_execveat+0xf3/0x140 [ 1896.795428][T15188] do_fast_syscall_32+0x281/0xc98 [ 1896.795449][T15188] entry_SYSENTER_compat+0x70/0x7f [ 1896.795468][T15188] RIP: 0023:0xf7f71869 [ 1896.826603][T15188] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1896.846229][T15188] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1896.854751][T15188] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:44:52 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000080)=""/168, 0xa8) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x8dffffff]}}, 0x1c) geteuid() 14:44:53 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5421, &(0x7f0000000000)=0x2) 14:44:53 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x4020940d, &(0x7f00000000c0)=0x3) [ 1896.862743][T15188] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1896.870850][T15188] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1896.878835][T15188] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1896.886826][T15188] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:53 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) ioctl$TUNGETFILTER(r1, 0x800854db, &(0x7f0000000000)=""/55) 14:44:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000002580)=""/4096, 0x7d) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x1, @empty, 'bcsh0\x00'}}, 0x1e) 14:44:53 executing program 2 (fault-call:2 fault-nth:4): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x91ffffff]}}, 0x1c) geteuid() 14:44:53 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5450, &(0x7f0000000000)=0x2) 14:44:53 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x402c5828, &(0x7f00000000c0)=0x3) [ 1897.129752][T15911] FAULT_INJECTION: forcing a failure. [ 1897.129752][T15911] name failslab, interval 1, probability 0, space 0, times 0 [ 1897.193253][T15911] CPU: 1 PID: 15911 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1897.201279][T15911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1897.211360][T15911] Call Trace: [ 1897.214678][T15911] dump_stack+0x172/0x1f0 [ 1897.219038][T15911] should_fail.cold+0xa/0x15 [ 1897.223655][T15911] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1897.229489][T15911] ? ___might_sleep+0x163/0x280 [ 1897.234366][T15911] __should_failslab+0x121/0x190 [ 1897.239320][T15911] should_failslab+0x9/0x14 [ 1897.243838][T15911] kmem_cache_alloc_node_trace+0x270/0x720 [ 1897.243864][T15911] __kmalloc_node+0x3d/0x70 [ 1897.243882][T15911] kvmalloc_node+0x68/0x100 [ 1897.258690][T15911] alloc_fdtable+0xd6/0x290 [ 1897.258707][T15911] dup_fd+0x743/0xb30 [ 1897.258735][T15911] unshare_fd+0x160/0x1d0 [ 1897.258753][T15911] ? set_max_threads+0xe0/0xe0 [ 1897.258768][T15911] ? find_held_lock+0x35/0x130 [ 1897.258786][T15911] ? cache_grow_end+0xa4/0x190 [ 1897.258806][T15911] unshare_files+0x7f/0x1f0 [ 1897.258822][T15911] ? __ia32_sys_unshare+0x40/0x40 [ 1897.258848][T15911] __do_execve_file.isra.0+0x27e/0x23f0 [ 1897.258868][T15911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1897.307193][T15911] ? __phys_addr_symbol+0x30/0x70 [ 1897.312242][T15911] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1897.317994][T15911] ? __check_object_size+0x3d/0x42f [ 1897.323226][T15911] ? copy_strings_kernel+0x110/0x110 [ 1897.328528][T15911] ? strncpy_from_user+0x2a8/0x380 [ 1897.333663][T15911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:44:53 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5452, &(0x7f0000000000)=0x2) [ 1897.339932][T15911] __ia32_compat_sys_execveat+0xf3/0x140 [ 1897.345594][T15911] do_fast_syscall_32+0x281/0xc98 [ 1897.350642][T15911] entry_SYSENTER_compat+0x70/0x7f [ 1897.355765][T15911] RIP: 0023:0xf7f71869 [ 1897.359839][T15911] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1897.379450][T15911] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 14:44:53 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40106435, &(0x7f0000000000)={0x80000001, 0x0, 0x10003, 0xb3}) [ 1897.387883][T15911] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1897.395862][T15911] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1897.403847][T15911] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1897.411831][T15911] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1897.419817][T15911] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:53 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x402c582a, &(0x7f00000000c0)=0x3) 14:44:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xb8ff0000]}}, 0x1c) geteuid() 14:44:53 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x5460, &(0x7f0000000000)=0x2) 14:44:53 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400200, 0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) flock(r0, 0x4) [ 1897.553608][ C0] net_ratelimit: 2 callbacks suppressed [ 1897.553620][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:53 executing program 2 (fault-call:2 fault-nth:5): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:53 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getparam(r3, &(0x7f0000000080)) dup3(r0, r2, 0x80040) 14:44:53 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0xc0189436, &(0x7f00000000c0)=0x3) 14:44:53 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40049409, &(0x7f0000000000)=0x2) [ 1897.696785][T16649] FAULT_INJECTION: forcing a failure. [ 1897.696785][T16649] name failslab, interval 1, probability 0, space 0, times 0 [ 1897.783860][T16649] CPU: 1 PID: 16649 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1897.791894][T16649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1897.801975][T16649] Call Trace: [ 1897.805287][T16649] dump_stack+0x172/0x1f0 [ 1897.809641][T16649] should_fail.cold+0xa/0x15 [ 1897.814256][T16649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1897.820094][T16649] ? ___might_sleep+0x163/0x280 [ 1897.824983][T16649] __should_failslab+0x121/0x190 [ 1897.829952][T16649] should_failslab+0x9/0x14 [ 1897.834475][T16649] kmem_cache_alloc_trace+0x2d1/0x760 [ 1897.839878][T16649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1897.845714][T16649] __do_execve_file.isra.0+0x325/0x23f0 [ 1897.851385][T16649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1897.857640][T16649] ? __phys_addr_symbol+0x30/0x70 [ 1897.862679][T16649] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1897.868427][T16649] ? __check_object_size+0x3d/0x42f [ 1897.873624][T16649] ? copy_strings_kernel+0x110/0x110 [ 1897.881679][T16649] ? strncpy_from_user+0x2a8/0x380 [ 1897.886809][T16649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1897.893134][T16649] __ia32_compat_sys_execveat+0xf3/0x140 [ 1897.898793][T16649] do_fast_syscall_32+0x281/0xc98 [ 1897.903834][T16649] entry_SYSENTER_compat+0x70/0x7f [ 1897.909126][T16649] RIP: 0023:0xf7f71869 [ 1897.913200][T16649] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:44:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xc4ffffff]}}, 0x1c) geteuid() [ 1897.932797][T16649] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1897.941216][T16649] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1897.949179][T16649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1897.957142][T16649] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1897.965109][T16649] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1897.973072][T16649] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:54 executing program 5: sched_yield() r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r0, r1, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000080)={0x0, 0x3, 0x9, &(0x7f0000000000)=0xfb0}) 14:44:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x2040) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000040)) syz_genetlink_get_family_id$tipc(0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$input_event(r0, &(0x7f00000000c0)={{r1, r2/1000+10000}, 0x16, 0x80, 0x6}, 0x10) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r3, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:54 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x4008620b, &(0x7f0000000000)=0x2) 14:44:54 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0xc020660b, &(0x7f00000000c0)=0x3) 14:44:54 executing program 2 (fault-call:2 fault-nth:6): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xdc7f0000]}}, 0x1c) geteuid() 14:44:54 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x4, @mcast2, 0x6be04dc0}}, 0x7f, 0xffffffffffffff00, 0x80000000, 0x1, 0x1}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0x400, 0x200, 0x200000000, 0x3, r3}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x87, @multicast1, 0x4e21, 0x3, 'fo\x00', 0x23, 0x3, 0x32}, 0x2c) [ 1898.194178][T17147] FAULT_INJECTION: forcing a failure. [ 1898.194178][T17147] name failslab, interval 1, probability 0, space 0, times 0 [ 1898.213107][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xe02e0000]}}, 0x1c) geteuid() [ 1898.290741][T17147] CPU: 1 PID: 17147 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1898.298855][T17147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1898.308946][T17147] Call Trace: [ 1898.312267][T17147] dump_stack+0x172/0x1f0 [ 1898.316628][T17147] should_fail.cold+0xa/0x15 [ 1898.321241][T17147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1898.327443][T17147] ? ___might_sleep+0x163/0x280 [ 1898.332326][T17147] __should_failslab+0x121/0x190 [ 1898.337287][T17147] should_failslab+0x9/0x14 [ 1898.341804][T17147] kmem_cache_alloc_trace+0x2d1/0x760 [ 1898.347204][T17147] __do_execve_file.isra.0+0x325/0x23f0 [ 1898.352767][T17147] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1898.359024][T17147] ? __phys_addr_symbol+0x30/0x70 [ 1898.364057][T17147] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1898.369793][T17147] ? __check_object_size+0x3d/0x42f [ 1898.375457][T17147] ? copy_strings_kernel+0x110/0x110 [ 1898.380761][T17147] ? strncpy_from_user+0x2a8/0x380 [ 1898.385903][T17147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1898.392168][T17147] __ia32_compat_sys_execveat+0xf3/0x140 [ 1898.397820][T17147] do_fast_syscall_32+0x281/0xc98 [ 1898.402863][T17147] entry_SYSENTER_compat+0x70/0x7f [ 1898.408005][T17147] RIP: 0023:0xf7f71869 [ 1898.412079][T17147] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1898.431695][T17147] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 14:44:54 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0xb) [ 1898.440115][T17147] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1898.448081][T17147] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1898.456050][T17147] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1898.464184][T17147] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1898.472145][T17147] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:54 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x4020940d, &(0x7f0000000000)=0x2) [ 1898.496336][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:54 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x402c5828, &(0x7f0000000000)=0x2) 14:44:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xe8030000]}}, 0x1c) geteuid() 14:44:54 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x3f, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f0000000080)={{0x0, @addr=0xffffffffffff2e15}, 0x8, 0x8e, 0xc8}) 14:44:54 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) setxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f00000000c0)='/dev/ion\x00', 0x9, 0x2) dup3(r0, r1, 0x0) 14:44:54 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x402c582a, &(0x7f0000000000)=0x2) 14:44:54 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000d40)='attr\x00') ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x10000032, 0x0, r1}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000005c0)={0x0, @in6={{0xa, 0x4e22, 0xfae, @empty, 0x100000001}}}, &(0x7f0000000680)=0x88) sendmmsg$inet_sctp(r3, &(0x7f0000000cc0)=[{&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x2, @local, 0x9}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000100)="6b88f27b5144808507e70459d971301d202736e4ea8a11bfd1eb2619f1037a9e083abb72f54ffba5b0ac9475ec793c7e0a930412af97d2000bad82f8ab556405642b00a5655ce5d2ced5a8f9870ca5cb52a4a36541cbec83", 0x58}, {&(0x7f00000001c0)="32cb2a32410ea997434b866a87a08bddd8a5ae9cea97e1ed9617bfd426725563c1441a4631b0c4acd864fdc5a69d", 0x2e}, {&(0x7f0000000200)="9327812118aa889d8f2145911b0327f8d2105e29e8804a6f2a924c302f71fa1a71fa54c8d893ae80ba2fb121703a143945ee11680978c9e38d161390a7482197cc4d72937567c5d9138cc16c0351c548c6a97b6dd4bcb86b6052744876c7df5802c52151dd36be962258c9c333721c7d041ed2088b638ce2eeb0dd1734d3a435b7914e84af", 0x85}, {&(0x7f00000002c0)="1ed966c1b8417d8a0aa0d43924709c11c6293416b12bc3b910281f74a798607011564497608789588795e3eb345f2ba899be7f8a8d0acf30307e3f1897295a887c6c0a076ac41621dc7ff985a82f90dbb831a4932bf6102dfc77cf8b9f05623fc4d223ab2765e0b31b62e1d3500051d23c963c0edd62f1e7a05f1471fae19046719ab9ce363fdb96ee7c28d53e888981f61f3c20e00c35be5aefe337d7c2cf93ff28c7ff7511c721fe96c6d1995d77fe413dcdd74a728e1a0d3d9bb36c1f1a2d35090ea507e362c3a86628b6d2af5caecae174c635a1a1e1aa764dee2d4dcb810969691eb9a7f48dbfc0388018", 0xed}, {&(0x7f00000003c0)="75f4ef4cea85031c2f586ae4e412a158050da76c122800d6523a79aec30757ba4983e448eab97033979bd90ee6e3bf74d45dd783223b31795527a0e7ad43bcc75287b2a088416d8e1d4c6decaee3b30e5e5315131ffbfd7cbc65d6aba08aa5abccfdf211ee6f1def920c9d19acde147a66c9f1767f510f02317616d7c5", 0x7d}], 0x5, &(0x7f0000000480)=[@dstaddrv6={0x1c, 0x84, 0x8, @mcast1}, @authinfo={0x10, 0x84, 0x6, {0x5}}, @prinfo={0x14, 0x84, 0x5, {0x30, 0x27}}, @dstaddrv6={0x1c, 0x84, 0x8, @loopback}, @dstaddrv6={0x1c, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], 0x78, 0x40000c1}, {&(0x7f0000000500)=@in={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000540)="1a1a69b0678b", 0x6}], 0x1, &(0x7f00000006c0)=[@dstaddrv4={0x10, 0x84, 0x7, @rand_addr=0x401}, @dstaddrv6={0x1c, 0x84, 0x8, @local}, @sndinfo={0x1c, 0x84, 0x2, {0xffffffffffffff01, 0x0, 0x7ff, 0x0, r4}}, @prinfo={0x14, 0x84, 0x5, {0x20, 0x3}}, @init={0x14, 0x84, 0x0, {0xfff, 0x5, 0x100000000000000, 0xb0}}, @authinfo={0x10, 0x84, 0x6, {0x40}}, @init={0x14, 0x84, 0x0, {0x5, 0x3, 0x9, 0x9}}, @init={0x14, 0x84, 0x0, {0x5, 0x25a8, 0x8, 0x6}}], 0xa8}, {&(0x7f0000000780)=@in6={0xa, 0x4e21, 0x80, @empty, 0xffffffffffffff00}, 0x1c, &(0x7f0000000c40)=[{&(0x7f00000007c0)="9ae0a3a1420a202b50ebbd6f26ca8aafd357d95be01562631043154a92fdacbfea9924518b908b1b7c1efca3f7840462ac5fd74cba0015e39b19f0ab0abda6fcf176ce98a53b3b79b818d0f743adcbed3d15d8cc6b0605d0b16dd15e04593025fa2440a11e94d43248c6692e085f6919e4c9e6eb303e577214ffc6c9eadb430b0c30539dff1bf463d53f78f73d0bbb1eda560faa57d5c0fc4ee5236f8bc660907afe60d1", 0xa4}, {&(0x7f0000000880)="86a6f32e9277da2b387dbea53317f768334c7ba09e7137ab4cbbd024893b91adad290136fb9620588930675ff5408f54f477f6911db7ea4fd30f67366b16c0eeca17d4390bf193cbb067a97d72e69983ef87b8ad8ec9a2c146697ba964c29f91c46a752ca549bdc5387c1d03dfd3bc5f48cc3799002ced1d126273df1bc96e32afd1fcf1f9fea05cffd4fdb8204f084cf0f127be8748a3500254be4d4669a9932180b5c6cfbf842370ee67f520a8a86cb28f8fde2b709c3c8b65116c94a739335cb19cd3267205c43fbd42e0", 0xcc}, {&(0x7f0000000980)="d1d997c26364b5fe02c1856c6dc52593e0eab98f79a8b7b52826aeaec462dc00048194c720e6fe582625cf41e16294c5a55b7dac98aa631a8476f3ba2b0e05e74c21f5f36c478af60526e82a134d9c0de292bb8ddcfaec5d07bbbf4b998123af83b54d5e70aeb88c33af23c9f714b7a617687e880a593c0a9776ea6eee342b5fcb2e8c8a31e6012002e44eb75eb031b3bd48bd77ce366f34e9cc3552155967f87ba4cd1840cbf469840fddca69057307fad6c14a5505da0b0d385d", 0xbb}, {&(0x7f0000000a40)="da3a1b2105ca4c2cbfa060996a1ee47b52041656db7899a7000c2884c1ff10ba40923afa67413f0fbf9a28bd509209382bc9d3bd9d4dff04f6fa4b0fe33e6d4da90a9c43a0c7e766241fc4afd9e1946c3187d74df793655ae9ba61ae205db827c53a777c03aa3a83655eb2199d7d476a9d187abc9965bf6394c945633ba70e4d69999556", 0x84}, {&(0x7f0000000b00)="9c0494407f9b345c4aa2d9", 0xb}, {&(0x7f0000000b40)="5e2174a7f40feaefce15448cf37ff6918157c7d52f6814eb13e8989c171259f5c556adba74ab0e0533744eea78a2664da2f7951f9c9a12754b40024df8e67222ba1ca9c12c5880a2f4ea76a79ae609c35d163f6e1a81a49d5adb51eb14a6a5a50314d7ec4df2b4773dbfa995c7fc72cd52670cef2adf1ca093b49d45c80532f63ed53dc08a51c742e891ca15d5f39e0f8806624ac25392ff6a64d359d256a47094e789cd85d2a5db5471ddf48a119ff4364e2bf2130cad83c35936bbdbba6d3f92c0e507811f99ac9101e3747d78c874b61badfd39bcb56c6ea322d0595cf731ca79fa0889cfa1", 0xe7}], 0x6, &(0x7f0000000c80)=[@dstaddrv4={0x10, 0x84, 0x7, @multicast2}, @dstaddrv6={0x1c, 0x84, 0x8, @local}, @prinfo={0x14, 0x84, 0x5, {0x30, 0x4}}], 0x40, 0x40}], 0x3, 0x8004) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:54 executing program 2 (fault-call:2 fault-nth:7): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1898.729948][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:55 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0xc0189436, &(0x7f0000000000)=0x2) [ 1898.843175][T18043] FAULT_INJECTION: forcing a failure. [ 1898.843175][T18043] name failslab, interval 1, probability 0, space 0, times 0 14:44:55 executing program 5: r0 = socket$inet(0x2, 0xa, 0x9) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r1, 0x10001, 0xfffffffeffffffff}, &(0x7f0000000100)=0xc) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r2, r3, 0x0) 14:44:55 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x6) 14:44:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xeffdffff]}}, 0x1c) geteuid() 14:44:55 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0xc020660b, &(0x7f0000000000)=0x2) [ 1899.023142][T18043] CPU: 0 PID: 18043 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1899.031170][T18043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1899.041239][T18043] Call Trace: [ 1899.044555][T18043] dump_stack+0x172/0x1f0 [ 1899.048920][T18043] should_fail.cold+0xa/0x15 [ 1899.053538][T18043] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1899.059365][T18043] ? ___might_sleep+0x163/0x280 [ 1899.064237][T18043] __should_failslab+0x121/0x190 [ 1899.064254][T18043] should_failslab+0x9/0x14 [ 1899.064277][T18043] kmem_cache_alloc+0x2b2/0x6f0 [ 1899.078549][T18043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.078567][T18043] ? __validate_process_creds+0x22d/0x380 [ 1899.078589][T18043] prepare_creds+0x3e/0x3f0 [ 1899.078605][T18043] prepare_exec_creds+0x12/0xf0 [ 1899.078625][T18043] __do_execve_file.isra.0+0x393/0x23f0 [ 1899.106490][T18043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1899.112754][T18043] ? __phys_addr_symbol+0x30/0x70 [ 1899.117800][T18043] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1899.123634][T18043] ? __check_object_size+0x3d/0x42f [ 1899.128865][T18043] ? copy_strings_kernel+0x110/0x110 [ 1899.134170][T18043] ? strncpy_from_user+0x2a8/0x380 [ 1899.139299][T18043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.145561][T18043] __ia32_compat_sys_execveat+0xf3/0x140 [ 1899.151210][T18043] do_fast_syscall_32+0x281/0xc98 [ 1899.156279][T18043] entry_SYSENTER_compat+0x70/0x7f [ 1899.156292][T18043] RIP: 0023:0xf7f71869 14:44:55 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x6, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0x9, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:55 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0xb) [ 1899.156310][T18043] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1899.185060][T18043] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1899.185075][T18043] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1899.185083][T18043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1899.185091][T18043] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:44:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x408401) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)=r2) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x40, 0x40) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xf4010000]}}, 0x1c) geteuid() 14:44:55 executing program 2 (fault-call:2 fault-nth:8): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1899.185099][T18043] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1899.185107][T18043] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:55 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000080)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000000)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r3, r4) [ 1899.321333][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1899.326349][T18592] FAULT_INJECTION: forcing a failure. [ 1899.326349][T18592] name failslab, interval 1, probability 0, space 0, times 0 [ 1899.393566][T18592] CPU: 1 PID: 18592 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1899.401600][T18592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1899.411672][T18592] Call Trace: [ 1899.414985][T18592] dump_stack+0x172/0x1f0 [ 1899.419347][T18592] should_fail.cold+0xa/0x15 [ 1899.423976][T18592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1899.429827][T18592] ? ___might_sleep+0x163/0x280 [ 1899.434708][T18592] __should_failslab+0x121/0x190 14:44:55 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xf5ffffff]}}, 0x1c) geteuid() [ 1899.439671][T18592] should_failslab+0x9/0x14 [ 1899.444198][T18592] __kmalloc+0x2dc/0x740 [ 1899.448457][T18592] ? refcount_inc_not_zero_checked+0x144/0x200 [ 1899.454630][T18592] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1899.460460][T18592] ? security_prepare_creds+0x123/0x190 [ 1899.466029][T18592] security_prepare_creds+0x123/0x190 [ 1899.471438][T18592] prepare_creds+0x2f5/0x3f0 [ 1899.476056][T18592] prepare_exec_creds+0x12/0xf0 [ 1899.480934][T18592] __do_execve_file.isra.0+0x393/0x23f0 [ 1899.486503][T18592] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1899.492766][T18592] ? __phys_addr_symbol+0x30/0x70 [ 1899.497876][T18592] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1899.503620][T18592] ? __check_object_size+0x3d/0x42f [ 1899.508858][T18592] ? copy_strings_kernel+0x110/0x110 [ 1899.514172][T18592] ? strncpy_from_user+0x2a8/0x380 [ 1899.519311][T18592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1899.525595][T18592] __ia32_compat_sys_execveat+0xf3/0x140 [ 1899.531262][T18592] do_fast_syscall_32+0x281/0xc98 [ 1899.536322][T18592] entry_SYSENTER_compat+0x70/0x7f 14:44:55 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x20240) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) [ 1899.541452][T18592] RIP: 0023:0xf7f71869 [ 1899.545537][T18592] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1899.565159][T18592] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1899.573589][T18592] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1899.581575][T18592] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 14:44:55 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x5) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x404000, 0x0) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000100)={0x15002, 0xf000, 0x14fc0f60, 0x6, 0x2}) 14:44:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xfc000000]}}, 0x1c) geteuid() [ 1899.589567][T18592] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1899.597547][T18592] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1899.597556][T18592] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:55 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000080)=""/147, 0x130000, 0x1800, 0x800}, 0x18) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x1, 0x3d, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=@random={'osx.', '/dev/ion\x00'}, &(0x7f0000000200)='/dev/ion\x00', 0x9, 0x2) [ 1899.666160][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:55 executing program 2 (fault-call:2 fault-nth:9): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:55 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xa4a, 0x100) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000000c0)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) [ 1899.824501][T19337] FAULT_INJECTION: forcing a failure. [ 1899.824501][T19337] name failslab, interval 1, probability 0, space 0, times 0 [ 1899.855500][T19337] CPU: 0 PID: 19337 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1899.863520][T19337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1899.873582][T19337] Call Trace: [ 1899.873609][T19337] dump_stack+0x172/0x1f0 [ 1899.873632][T19337] should_fail.cold+0xa/0x15 [ 1899.873651][T19337] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1899.873670][T19337] ? ___might_sleep+0x163/0x280 [ 1899.873690][T19337] __should_failslab+0x121/0x190 [ 1899.873704][T19337] should_failslab+0x9/0x14 [ 1899.873720][T19337] kmem_cache_alloc+0x2b2/0x6f0 [ 1899.873736][T19337] ? kasan_check_read+0x11/0x20 [ 1899.873756][T19337] __alloc_file+0x27/0x300 [ 1899.931360][T19337] alloc_empty_file+0x72/0x170 [ 1899.936588][T19337] path_openat+0xef/0x46e0 [ 1899.941117][T19337] ? save_stack+0xa9/0xd0 [ 1899.945466][T19337] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1899.950844][T19337] ? __kmalloc+0x15c/0x740 [ 1899.955276][T19337] ? security_prepare_creds+0x123/0x190 [ 1899.960839][T19337] ? prepare_creds+0x2f5/0x3f0 [ 1899.965608][T19337] ? prepare_exec_creds+0x12/0xf0 [ 1899.970709][T19337] ? __do_execve_file.isra.0+0x393/0x23f0 [ 1899.976439][T19337] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 1899.982253][T19337] ? do_fast_syscall_32+0x281/0xc98 [ 1899.987460][T19337] ? entry_SYSENTER_compat+0x70/0x7f [ 1899.992737][T19337] ? debug_smp_processor_id+0x3c/0x280 [ 1899.998199][T19337] ? perf_trace_lock+0xeb/0x510 [ 1900.003046][T19337] do_filp_open+0x1a1/0x280 [ 1900.007542][T19337] ? __lockdep_free_key_range+0x120/0x120 [ 1900.013271][T19337] ? may_open_dev+0x100/0x100 [ 1900.017944][T19337] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1900.023577][T19337] ? find_held_lock+0x35/0x130 [ 1900.028341][T19337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.034581][T19337] ? debug_smp_processor_id+0x3c/0x280 [ 1900.040064][T19337] ? perf_trace_lock+0xeb/0x510 [ 1900.045085][T19337] ? perf_trace_lock+0xeb/0x510 [ 1900.049948][T19337] ? __lockdep_free_key_range+0x120/0x120 [ 1900.055657][T19337] ? __lockdep_free_key_range+0x120/0x120 [ 1900.061381][T19337] do_open_execat+0x137/0x690 [ 1900.066056][T19337] ? unregister_binfmt+0x170/0x170 [ 1900.071165][T19337] ? lock_downgrade+0x880/0x880 [ 1900.076025][T19337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.082263][T19337] ? kasan_check_read+0x11/0x20 [ 1900.087105][T19337] ? do_raw_spin_unlock+0x57/0x270 [ 1900.092214][T19337] __do_execve_file.isra.0+0x178d/0x23f0 [ 1900.097855][T19337] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1900.104116][T19337] ? copy_strings_kernel+0x110/0x110 [ 1900.109393][T19337] ? strncpy_from_user+0x2a8/0x380 [ 1900.114608][T19337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.120861][T19337] __ia32_compat_sys_execveat+0xf3/0x140 [ 1900.126500][T19337] do_fast_syscall_32+0x281/0xc98 [ 1900.131524][T19337] entry_SYSENTER_compat+0x70/0x7f [ 1900.136632][T19337] RIP: 0023:0xf7f71869 [ 1900.140696][T19337] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1900.160291][T19337] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1900.168704][T19337] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1900.176681][T19337] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1900.184660][T19337] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1900.192643][T19337] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1900.200693][T19337] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xfe800000]}}, 0x1c) geteuid() 14:44:56 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xa21, 0x82040) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001880)={0x0, @loopback, @initdev}, &(0x7f00000018c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000100)={'team0\x00', r3}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000240)=0x1000005) ioctl$TIOCSBRK(r2, 0x5427) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f0000000080)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000140)) ioctl$TIOCCONS(r0, 0x541d) ioctl$TIOCSBRK(r2, 0x5427) 14:44:56 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x124, 0x9bc2ccbe987190c6) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x2f1d, 0x1, 0x1, r1}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r2, r3, 0x0) recvmsg(r0, &(0x7f0000000580)={&(0x7f0000000100)=@ax25={{}, [@null, @remote, @rose, @rose, @bcast, @remote, @bcast]}, 0x80, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/51, 0x33}, {&(0x7f0000000200)=""/40, 0x28}, {&(0x7f0000000240)=""/117, 0x75}, {&(0x7f00000002c0)=""/76, 0x4c}, {&(0x7f0000000340)=""/167, 0xa7}, {&(0x7f0000000400)=""/229, 0xe5}, {&(0x7f0000000500)=""/1, 0x1}], 0x7}, 0x40000020) 14:44:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) r0 = socket$netlink(0x10, 0x3, 0xe) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x78, r1, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7ff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x20}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x41}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x8004}, 0x800) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) restart_syscall() getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:56 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x68, r1, 0x0, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x101, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20040800}, 0x8004) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) [ 1900.283137][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:56 executing program 2 (fault-call:2 fault-nth:10): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:56 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) mq_getsetattr(r2, &(0x7f00000000c0)={0x4871, 0x1, 0x2, 0x6, 0x401, 0x1, 0x6, 0x9}, &(0x7f0000000100)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:56 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0xa00, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4004) 14:44:56 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x3, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) [ 1900.418991][T19790] FAULT_INJECTION: forcing a failure. [ 1900.418991][T19790] name failslab, interval 1, probability 0, space 0, times 0 14:44:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xfec00000]}}, 0x1c) geteuid() [ 1900.485964][T19790] CPU: 1 PID: 19790 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1900.493998][T19790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1900.504072][T19790] Call Trace: [ 1900.507390][T19790] dump_stack+0x172/0x1f0 [ 1900.511770][T19790] should_fail.cold+0xa/0x15 [ 1900.516384][T19790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1900.522249][T19790] ? ___might_sleep+0x163/0x280 [ 1900.527135][T19790] __should_failslab+0x121/0x190 14:44:56 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1fc0000, 0x40) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000140)={r1, 0x1}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0xfffffffffffffffc, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) [ 1900.532091][T19790] should_failslab+0x9/0x14 [ 1900.536614][T19790] kmem_cache_alloc+0x2b2/0x6f0 [ 1900.541491][T19790] ? rcu_read_lock_sched_held+0x110/0x130 [ 1900.547243][T19790] ? kmem_cache_alloc+0x32e/0x6f0 [ 1900.552305][T19790] security_file_alloc+0x39/0x170 [ 1900.552613][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1900.557454][T19790] __alloc_file+0xac/0x300 [ 1900.557470][T19790] alloc_empty_file+0x72/0x170 [ 1900.557486][T19790] path_openat+0xef/0x46e0 [ 1900.557515][T19790] ? save_stack+0xa9/0xd0 [ 1900.557532][T19790] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1900.591843][T19790] ? __kmalloc+0x15c/0x740 [ 1900.596450][T19790] ? security_prepare_creds+0x123/0x190 [ 1900.602020][T19790] ? prepare_creds+0x2f5/0x3f0 [ 1900.606846][T19790] ? prepare_exec_creds+0x12/0xf0 [ 1900.611888][T19790] ? __do_execve_file.isra.0+0x393/0x23f0 [ 1900.618242][T19790] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 1900.624083][T19790] ? do_fast_syscall_32+0x281/0xc98 [ 1900.629479][T19790] ? entry_SYSENTER_compat+0x70/0x7f [ 1900.634809][T19790] ? debug_smp_processor_id+0x3c/0x280 [ 1900.640295][T19790] ? perf_trace_lock+0xeb/0x510 [ 1900.645165][T19790] do_filp_open+0x1a1/0x280 [ 1900.649685][T19790] ? __lockdep_free_key_range+0x120/0x120 [ 1900.655432][T19790] ? may_open_dev+0x100/0x100 [ 1900.660131][T19790] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1900.665776][T19790] ? find_held_lock+0x35/0x130 [ 1900.670562][T19790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.676825][T19790] ? debug_smp_processor_id+0x3c/0x280 14:44:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xff000000]}}, 0x1c) geteuid() 14:44:56 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2200, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000100)) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000080)=0x5) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) [ 1900.682300][T19790] ? perf_trace_lock+0xeb/0x510 [ 1900.687191][T19790] ? perf_trace_lock+0xeb/0x510 [ 1900.692061][T19790] ? __lockdep_free_key_range+0x120/0x120 [ 1900.697882][T19790] ? __lockdep_free_key_range+0x120/0x120 [ 1900.703625][T19790] do_open_execat+0x137/0x690 [ 1900.708320][T19790] ? unregister_binfmt+0x170/0x170 [ 1900.713451][T19790] ? lock_downgrade+0x880/0x880 [ 1900.718315][T19790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.724665][T19790] ? kasan_check_read+0x11/0x20 [ 1900.729594][T19790] ? do_raw_spin_unlock+0x57/0x270 14:44:56 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x20407, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) [ 1900.734734][T19790] __do_execve_file.isra.0+0x178d/0x23f0 [ 1900.740393][T19790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1900.746671][T19790] ? copy_strings_kernel+0x110/0x110 [ 1900.751994][T19790] ? strncpy_from_user+0x2a8/0x380 [ 1900.757132][T19790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1900.763402][T19790] __ia32_compat_sys_execveat+0xf3/0x140 [ 1900.769053][T19790] do_fast_syscall_32+0x281/0xc98 [ 1900.772272][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1900.774093][T19790] entry_SYSENTER_compat+0x70/0x7f [ 1900.774111][T19790] RIP: 0023:0xf7f71869 [ 1900.794297][T19790] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1900.813914][T19790] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1900.822350][T19790] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xff0f0000]}}, 0x1c) geteuid() [ 1900.831056][T19790] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1900.839043][T19790] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1900.847029][T19790] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1900.855015][T19790] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1900.989903][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:57 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ac, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000440)=0x0) timer_create(0x3, &(0x7f0000000400)={0x0, 0x3c, 0x0, @tid=r0}, &(0x7f0000000540)=0x0) r2 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0xd493, 0x200000) write$P9_RLERROR(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x38a) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xf0, r4, 0x308, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5f0c}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x642}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2cbf}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x40010}, 0x4040000) r5 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000380)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x601367deebc0598c}) ioctl$VIDIOC_G_AUDIO(r5, 0x80345621, &(0x7f0000000340)) 14:44:57 executing program 2 (fault-call:2 fault-nth:11): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:57 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x80000000005, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x2001) getsockname$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000140)=0x6) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x3) dup3(r0, r0, 0x0) 14:44:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000, 0x180) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x608002, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x6bc2, 0x3, 0x1, r1}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='lapb0\x00', 0x10) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) fgetxattr(r1, &(0x7f00000001c0)=@random={'osx.', 'proc(!proc\'\x18'}, &(0x7f0000000200)=""/219, 0xdb) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) signalfd4(r0, &(0x7f0000000300)={0x7}, 0x8, 0x800) 14:44:57 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0xa00, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xaeef, 0x4, 0x1, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xfffffdef]}}, 0x1c) geteuid() [ 1901.156852][T20558] FAULT_INJECTION: forcing a failure. [ 1901.156852][T20558] name failslab, interval 1, probability 0, space 0, times 0 [ 1901.195609][T20558] CPU: 0 PID: 20558 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1901.203870][T20558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1901.214073][T20558] Call Trace: [ 1901.217388][T20558] dump_stack+0x172/0x1f0 [ 1901.221750][T20558] should_fail.cold+0xa/0x15 [ 1901.226470][T20558] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1901.232309][T20558] ? ___might_sleep+0x163/0x280 [ 1901.237179][T20558] __should_failslab+0x121/0x190 [ 1901.242131][T20558] should_failslab+0x9/0x14 [ 1901.246659][T20558] kmem_cache_alloc+0x2b2/0x6f0 [ 1901.249165][T20659] Unknown ioctl -1071601152 [ 1901.251512][T20558] ? nr_iowait+0x130/0x130 [ 1901.251528][T20558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.251550][T20558] mm_alloc+0x1d/0xd0 [ 1901.266689][T20558] __do_execve_file.isra.0+0xaa3/0x23f0 [ 1901.266710][T20558] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1901.266733][T20558] ? copy_strings_kernel+0x110/0x110 [ 1901.266747][T20558] ? strncpy_from_user+0x2a8/0x380 [ 1901.266765][T20558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.276269][T20558] __ia32_compat_sys_execveat+0xf3/0x140 14:44:57 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xcc0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000140)={0x3800000, 0x25, 0x7}) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x228082, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) [ 1901.276288][T20558] do_fast_syscall_32+0x281/0xc98 [ 1901.276310][T20558] entry_SYSENTER_compat+0x70/0x7f [ 1901.314877][T20558] RIP: 0023:0xf7f71869 [ 1901.318957][T20558] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1901.338574][T20558] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1901.347002][T20558] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:44:57 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x101200, 0x0) setsockopt$TIPC_GROUP_LEAVE(r1, 0x10f, 0x88) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) 14:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xffffff8d]}}, 0x1c) geteuid() [ 1901.354989][T20558] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1901.362975][T20558] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1901.370965][T20558] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1901.378951][T20558] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:57 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:ldconfig_exec_t:s0\x00', 0x25, 0x2) syz_genetlink_get_family_id$tipc(0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4004240b, &(0x7f0000000000)={0x4, 0x70, 0x7, 0x4, 0x5, 0xffffffffffffffe0, 0x0, 0x507, 0x1, 0xb, 0x80000001, 0x8000000, 0x8, 0x94a, 0x1, 0x1f, 0x9, 0x0, 0x2, 0x7, 0xf573, 0x1, 0x2, 0x5, 0x1, 0x5, 0x7, 0x6, 0x5, 0x100000000, 0xa4, 0xdf, 0x5, 0x7f, 0x40, 0x100, 0x0, 0x7ff, 0x0, 0x5cd, 0x2, @perf_config_ext={0x800, 0x4}, 0x0, 0x9be, 0x40, 0x2, 0x5, 0x8, 0x3339}) r1 = getpgrp(0x0) timer_create(0x3, &(0x7f0000000240)={0x0, 0x2, 0x0, @tid=r1}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r3 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x3, 0x600000) getdents(r3, &(0x7f0000002580)=""/4096, 0x1000) r4 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x20, 0x0) ioctl$VIDIOC_G_SELECTION(r4, 0xc040565e, &(0x7f0000000280)={0x1, 0x0, 0x5, {0x4d8, 0x6c, 0x9, 0x8}}) 14:44:57 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1a, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:57 executing program 0: futex(&(0x7f0000000080)=0x4, 0x80000000000b, 0x3, 0x0, &(0x7f0000048000)=0x2, 0x400) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0xfffffffffffffffd, &(0x7f0000000000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x40000000, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:57 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r0, 0x80000) 14:44:57 executing program 2 (fault-call:2 fault-nth:12): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xffffff91]}}, 0x1c) geteuid() [ 1901.679875][T21336] FAULT_INJECTION: forcing a failure. [ 1901.679875][T21336] name failslab, interval 1, probability 0, space 0, times 0 14:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xffffffc4]}}, 0x1c) geteuid() [ 1901.722988][T21336] CPU: 0 PID: 21336 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1901.731016][T21336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1901.741084][T21336] Call Trace: [ 1901.744401][T21336] dump_stack+0x172/0x1f0 [ 1901.748849][T21336] should_fail.cold+0xa/0x15 [ 1901.753462][T21336] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1901.759294][T21336] ? ___might_sleep+0x163/0x280 [ 1901.764168][T21336] __should_failslab+0x121/0x190 [ 1901.769125][T21336] should_failslab+0x9/0x14 [ 1901.773665][T21336] kmem_cache_alloc+0x2b2/0x6f0 [ 1901.778535][T21336] ? nr_iowait+0x130/0x130 [ 1901.782969][T21336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1901.789239][T21336] mm_alloc+0x1d/0xd0 [ 1901.793253][T21336] __do_execve_file.isra.0+0xaa3/0x23f0 [ 1901.798822][T21336] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1901.805097][T21336] ? copy_strings_kernel+0x110/0x110 [ 1901.810412][T21336] ? strncpy_from_user+0x2a8/0x380 [ 1901.815543][T21336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:44:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xfffffff5]}}, 0x1c) geteuid() [ 1901.821904][T21336] __ia32_compat_sys_execveat+0xf3/0x140 [ 1901.827567][T21336] do_fast_syscall_32+0x281/0xc98 [ 1901.832637][T21336] entry_SYSENTER_compat+0x70/0x7f [ 1901.837768][T21336] RIP: 0023:0xf7f71869 [ 1901.841846][T21336] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1901.861489][T21336] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 14:44:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x18f7fb436c2]}}, 0x1c) geteuid() 14:44:58 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0245628, &(0x7f0000000080)={0x0, 0xfffffffffffff801, 0xfff, [], &(0x7f0000000000)=0x200}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xac, "e71d572d2e6c75b7fcedf853184567cd894eafb59b6e06dbcead6ee7a1ee6d43778a87be3ac7ace74f48713646b9b54b3521e958ade743bf7b25caa4cb40426d7ae75f07957f8c859551c7615c052551fbb112e61075f527253ac4f1acdf9c7242d6dd7c30ffb53c7d388b9270ce3c159d61d0307df744f2a9f14aa928381823ff7021233922c958df6b15437bb1568cdc7b7d77e1c7c94fa6cf1490b0aadc1ddf9d7ab1607f43e6bb3d0f94"}, &(0x7f0000000100)=0xb4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r3, 0x22d}, &(0x7f0000000280)=0x8) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:58 executing program 5: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) fcntl$setpipe(r0, 0x407, 0x7) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$VT_WAITACTIVE(r2, 0x5607) dup3(r1, r2, 0x0) [ 1901.869922][T21336] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1901.877910][T21336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1901.885905][T21336] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1901.893906][T21336] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1901.901897][T21336] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:58 executing program 2 (fault-call:2 fault-nth:13): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1902.027893][T21957] FAULT_INJECTION: forcing a failure. [ 1902.027893][T21957] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1902.045742][T21957] CPU: 1 PID: 21957 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1902.053764][T21957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1902.063923][T21957] Call Trace: [ 1902.067240][T21957] dump_stack+0x172/0x1f0 [ 1902.071607][T21957] should_fail.cold+0xa/0x15 [ 1902.076588][T21957] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1902.082398][T21957] ? ___might_sleep+0x163/0x280 [ 1902.087258][T21957] should_fail_alloc_page+0x50/0x60 [ 1902.092449][T21957] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1902.097817][T21957] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1902.103534][T21957] ? find_held_lock+0x35/0x130 [ 1902.108290][T21957] ? percpu_ref_put_many+0x94/0x190 [ 1902.113478][T21957] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1902.119714][T21957] alloc_pages_current+0x107/0x210 [ 1902.124822][T21957] __get_free_pages+0xc/0x40 [ 1902.129413][T21957] pgd_alloc+0x8b/0x3f0 [ 1902.133575][T21957] ? pgd_page_get_mm+0x40/0x40 [ 1902.138354][T21957] ? lockdep_init_map+0x1be/0x6d0 [ 1902.143369][T21957] ? lockdep_init_map+0x1be/0x6d0 [ 1902.148391][T21957] mm_init+0x590/0x9b0 [ 1902.152455][T21957] mm_alloc+0xa6/0xd0 [ 1902.156434][T21957] __do_execve_file.isra.0+0xaa3/0x23f0 [ 1902.161969][T21957] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1902.168210][T21957] ? copy_strings_kernel+0x110/0x110 [ 1902.173483][T21957] ? strncpy_from_user+0x2a8/0x380 [ 1902.178595][T21957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.184839][T21957] __ia32_compat_sys_execveat+0xf3/0x140 [ 1902.190467][T21957] do_fast_syscall_32+0x281/0xc98 [ 1902.195490][T21957] entry_SYSENTER_compat+0x70/0x7f [ 1902.200596][T21957] RIP: 0023:0xf7f71869 [ 1902.204660][T21957] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1902.224254][T21957] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1902.233214][T21957] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1902.241171][T21957] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1902.249133][T21957] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1902.257097][T21957] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1902.265060][T21957] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:58 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0xc0040, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x47b4, 0x101000) ioctl$TUNGETFILTER(r1, 0x800854db, &(0x7f0000000040)=""/139) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:58 executing program 2 (fault-call:2 fault-nth:14): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1902.370429][T22133] FAULT_INJECTION: forcing a failure. [ 1902.370429][T22133] name failslab, interval 1, probability 0, space 0, times 0 [ 1902.419726][T22133] CPU: 1 PID: 22133 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1902.427755][T22133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1902.437844][T22133] Call Trace: [ 1902.441159][T22133] dump_stack+0x172/0x1f0 [ 1902.445519][T22133] should_fail.cold+0xa/0x15 [ 1902.450151][T22133] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1902.456071][T22133] ? ___might_sleep+0x163/0x280 [ 1902.460956][T22133] __should_failslab+0x121/0x190 14:44:58 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x14282) getdents(r2, &(0x7f00000001c0)=""/245, 0xf5) 14:44:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x20000000000]}}, 0x1c) geteuid() 14:44:58 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="1c9faf81b9df9dafe1dc0267f86e96eb2c6e32bb7cd4b09ff195ba106da9ea73ba9edc184813712c02ff1236b49bd8af44666feb44c5e8b45edc83ea53971f5951a63ca6025cc40dde612b2e0a82fd3838a995835dae44c211d6884642a60b9901f5c0", 0x63, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r3, 0x1) mq_getsetattr(r2, &(0x7f0000000000)={0x400, 0x80000001, 0x0, 0x9, 0x4, 0x7fff, 0x8, 0x6}, 0x0) 14:44:58 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000001c0)={0xffff, 0xa, 0x3, "848b0b15164b693fd22a9b6cdfc84c1fb3977a5e3a5cc890d249563efd0325d2"}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r3 = dup3(r2, r2, 0x80000) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000000)=0x44) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) [ 1902.465908][T22133] should_failslab+0x9/0x14 [ 1902.465925][T22133] kmem_cache_alloc+0x2b2/0x6f0 [ 1902.465952][T22133] vm_area_alloc+0x20/0x110 [ 1902.465970][T22133] __do_execve_file.isra.0+0xc34/0x23f0 [ 1902.465995][T22133] ? copy_strings_kernel+0x110/0x110 [ 1902.475324][T22133] ? strncpy_from_user+0x2a8/0x380 [ 1902.475343][T22133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.475365][T22133] __ia32_compat_sys_execveat+0xf3/0x140 [ 1902.475385][T22133] do_fast_syscall_32+0x281/0xc98 [ 1902.475407][T22133] entry_SYSENTER_compat+0x70/0x7f [ 1902.475418][T22133] RIP: 0023:0xf7f71869 [ 1902.475432][T22133] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1902.475440][T22133] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1902.475453][T22133] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1902.475461][T22133] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1902.475469][T22133] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1902.475478][T22133] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1902.475486][T22133] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:44:58 executing program 2 (fault-call:2 fault-nth:15): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x7ffffffff000]}}, 0x1c) geteuid() 14:44:58 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x400001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r3, 0xc6, "872c54", "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"}}, 0x110) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast2, @in6=@remote, 0x4e21, 0x7, 0x4e24, 0xffffffff, 0x2, 0x20, 0x20, 0x2c, 0x0, r4}, {0x6, 0x80000001, 0x101, 0xfffffffffffffbff, 0xb4, 0xffff, 0x4, 0x2}, {0x10000, 0x1, 0x3}, 0x27, 0x6e6bbd, 0x3, 0x1, 0x1, 0x3}, {{@in6=@mcast2, 0x4d5, 0xff}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x0, 0x3, 0x8, 0x1f, 0x9fb1, 0xfffffffffffffffc}}, 0xe8) ioctl$PPPIOCSACTIVE(r2, 0x40087446, &(0x7f0000000300)={0x5, &(0x7f0000000140)=[{0x6, 0xa0, 0x342, 0x8}, {0x1f, 0x1, 0x2, 0x2}, {0x200, 0x7, 0x7, 0x2}, {0x9, 0x3, 0x6807, 0x93}, {0x0, 0x9, 0x9, 0x4d27}]}) 14:44:58 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x5, 0x0, 0x0, 0xffffffffffffff9c}) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f00000001c0)={0xe4, ""/228}) dup3(r0, r1, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) 14:44:58 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2a0a600}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x58, r3, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5d60}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3e0}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7fffffff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x8840}, 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) [ 1902.692588][T22527] FAULT_INJECTION: forcing a failure. [ 1902.692588][T22527] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1902.733994][T22527] CPU: 0 PID: 22527 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1902.742022][T22527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1902.752095][T22527] Call Trace: [ 1902.755407][T22527] dump_stack+0x172/0x1f0 [ 1902.759764][T22527] should_fail.cold+0xa/0x15 [ 1902.764379][T22527] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1902.770207][T22527] ? ___might_sleep+0x163/0x280 [ 1902.775083][T22527] should_fail_alloc_page+0x50/0x60 [ 1902.780298][T22527] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1902.785691][T22527] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1902.791419][T22527] ? current_time+0x6b/0x140 [ 1902.796033][T22527] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1902.801855][T22527] ? inode_init_owner+0x340/0x340 [ 1902.806889][T22527] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1902.812628][T22527] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1902.818893][T22527] alloc_pages_current+0x107/0x210 [ 1902.824028][T22527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.830292][T22527] get_zeroed_page+0x14/0x50 [ 1902.834908][T22527] __pud_alloc+0x3b/0x250 [ 1902.839271][T22527] __handle_mm_fault+0x7a5/0x3ec0 [ 1902.844326][T22527] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1902.849904][T22527] ? find_held_lock+0x35/0x130 [ 1902.854694][T22527] ? handle_mm_fault+0x322/0xb30 [ 1902.859669][T22527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.865937][T22527] ? kasan_check_read+0x11/0x20 [ 1902.870822][T22527] handle_mm_fault+0x43f/0xb30 [ 1902.875096][ C1] net_ratelimit: 1 callbacks suppressed [ 1902.875107][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1902.875607][T22527] __get_user_pages+0x7b6/0x1a40 [ 1902.875635][T22527] ? follow_page_mask+0x19a0/0x19a0 [ 1902.875654][T22527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.875680][T22527] ? fsnotify+0xbc0/0xbc0 [ 1902.875702][T22527] get_user_pages_remote+0x21d/0x440 [ 1902.923729][T22527] copy_strings.isra.0+0x3dc/0x890 [ 1902.928879][T22527] ? remove_arg_zero+0x590/0x590 [ 1902.933841][T22527] ? prepare_binprm+0x6aa/0x940 [ 1902.940198][T22527] ? lock_downgrade+0x880/0x880 [ 1902.945065][T22527] ? vma_link+0x117/0x180 [ 1902.949423][T22527] ? install_exec_creds+0x180/0x180 [ 1902.954646][T22527] copy_strings_kernel+0xa5/0x110 [ 1902.959697][T22527] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1902.965459][T22527] ? copy_strings_kernel+0x110/0x110 [ 1902.970764][T22527] ? strncpy_from_user+0x2a8/0x380 [ 1902.975889][T22527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1902.975913][T22527] __ia32_compat_sys_execveat+0xf3/0x140 [ 1902.975938][T22527] do_fast_syscall_32+0x281/0xc98 [ 1902.975964][T22527] entry_SYSENTER_compat+0x70/0x7f [ 1902.987815][T22527] RIP: 0023:0xf7f71869 [ 1902.987829][T22527] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1902.987837][T22527] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 14:44:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x5000000000000]}}, 0x1c) geteuid() [ 1903.021617][T22527] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1903.038092][T22527] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1903.046098][T22527] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1903.046107][T22527] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1903.046115][T22527] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1903.099637][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:59 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x7fc, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/ip6_tables_names\x00') ioctl$NBD_SET_SOCK(r0, 0xab00, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000100)=[&(0x7f0000000080)='{mime_type&*em1ð1vboxnet0GPLvmnet1\x00', &(0x7f00000000c0)='\x00']) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x10000000001, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r2, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:44:59 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x8007, 0x3ffd) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xe40}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0xffffffff}, &(0x7f00000001c0)=0x8) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000200)=0x40003) fcntl$notify(r3, 0x402, 0x21) sync_file_range(r3, 0x5, 0x1, 0x6) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x6, 0x100, 0x8001, 0x8, 0x0, 0x6, 0x442, 0x1, 0x4, 0x0, 0x81, 0x1, 0x10000, 0x4, 0xff7c, 0x7, 0x1, 0x7ff, 0x9, 0x3, 0x8, 0xffff, 0x1, 0x2, 0x1c2, 0xf4c2, 0xbc7, 0x3, 0x3, 0x1191, 0xffffffff, 0xf7e1, 0x9, 0x0, 0x1, 0x9, 0x0, 0x2, 0x7, @perf_config_ext={0x10001, 0xdc}, 0x204, 0x40, 0x6, 0x0, 0xffff, 0xe7d, 0x1}, 0x0, 0x9, r1, 0x1) 14:44:59 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x8, 0x10, 0x1, 0xffffffffffffff9c}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) uselib(&(0x7f0000000080)='./file0\x00') ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:44:59 executing program 2 (fault-call:2 fault-nth:16): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:44:59 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0x93d) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x600000, 0x40000) [ 1903.247854][T22973] FAULT_INJECTION: forcing a failure. [ 1903.247854][T22973] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1903.288018][T22973] CPU: 0 PID: 22973 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1903.296048][T22973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1903.306120][T22973] Call Trace: [ 1903.309432][T22973] dump_stack+0x172/0x1f0 [ 1903.313792][T22973] should_fail.cold+0xa/0x15 [ 1903.318408][T22973] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1903.324239][T22973] ? ___might_sleep+0x163/0x280 [ 1903.329116][T22973] should_fail_alloc_page+0x50/0x60 [ 1903.334332][T22973] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1903.339733][T22973] ? __pud_alloc+0x1d3/0x250 [ 1903.344358][T22973] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1903.350182][T22973] ? __pud_alloc+0x1d3/0x250 [ 1903.354803][T22973] ? lock_downgrade+0x880/0x880 [ 1903.359680][T22973] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1903.365961][T22973] alloc_pages_current+0x107/0x210 [ 1903.371082][T22973] __pmd_alloc+0x41/0x460 [ 1903.375410][T22973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1903.381653][T22973] __handle_mm_fault+0x192a/0x3ec0 [ 1903.386768][T22973] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1903.392303][T22973] ? find_held_lock+0x35/0x130 [ 1903.397062][T22973] ? handle_mm_fault+0x322/0xb30 [ 1903.402002][T22973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1903.408236][T22973] ? kasan_check_read+0x11/0x20 [ 1903.413080][T22973] handle_mm_fault+0x43f/0xb30 [ 1903.417841][T22973] __get_user_pages+0x7b6/0x1a40 [ 1903.422786][T22973] ? follow_page_mask+0x19a0/0x19a0 [ 1903.427973][T22973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1903.434214][T22973] ? fsnotify+0xbc0/0xbc0 [ 1903.438543][T22973] get_user_pages_remote+0x21d/0x440 [ 1903.443830][T22973] copy_strings.isra.0+0x3dc/0x890 [ 1903.448939][T22973] ? remove_arg_zero+0x590/0x590 [ 1903.453864][T22973] ? prepare_binprm+0x6aa/0x940 [ 1903.458703][T22973] ? lock_downgrade+0x880/0x880 [ 1903.463544][T22973] ? vma_link+0x117/0x180 [ 1903.467868][T22973] ? install_exec_creds+0x180/0x180 [ 1903.473063][T22973] copy_strings_kernel+0xa5/0x110 [ 1903.478082][T22973] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1903.483719][T22973] ? copy_strings_kernel+0x110/0x110 [ 1903.488994][T22973] ? strncpy_from_user+0x2a8/0x380 [ 1903.494103][T22973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1903.500343][T22973] __ia32_compat_sys_execveat+0xf3/0x140 [ 1903.505972][T22973] do_fast_syscall_32+0x281/0xc98 [ 1903.510992][T22973] entry_SYSENTER_compat+0x70/0x7f [ 1903.516092][T22973] RIP: 0023:0xf7f71869 14:44:59 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) readahead(r0, 0x2, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) 14:44:59 executing program 0: r0 = add_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="1df0b6fae3e8d9ec87f21573682629655b5ee5ddcdeb8c5506fe9c52604b198990ab022ac9e7db5314794f1eda8011194edf4e21a749a93ec311310f552209273c9f2a4e1df95ba08f92f71ce21c54c822bddc449ab05deb72b989eae5801479f19363fa75aa1a4460aee20b65c8798b02eb3f3f1829217cedda080ce33dd2e3537e43e9ca9252303dce03e816cfa5d934c346ef55d290a2a417bd85479213b1c12df189d029fd308c031d98631fc8ba1cd06c6985f642d5bf0a2f6bb906806620403819ed", 0xc5, 0xfffffffffffffffd) add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="6c07f9b783637711343a9a4d12362c0ad024f7a5cc279507381dc0690e814d3bf27ffb7dfea7b5b8fcac05e646730fcdc74f4b61dfda56cec538d78131f5d40cabbc8ed2eaa2666b9739cb72c17b70a450065c41cafcd5191e379ad66617552e608f3b12b29390be8de84a81b93ab6030b83e0", 0x73, r0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f00000000c0)={0x1, 0x0, {0x7ff, 0x7, 0x301f, 0x0, 0x7, 0x3, 0x0, 0x5}}) r3 = add_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="19777315dd0e8d328d2e6d83eb14b590e67a3d3bf5fa3a1765056ae186c02e2b8d6de477c4", 0x25, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r3) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000540)=""/243) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000640)={{0x100000, 0x47d4f876b3d07cad, 0x3, 0x9df, 0x80000001, 0x4, 0x8001, 0x3, 0x6, 0x81, 0x8, 0x80000001}, {0x3000, 0x100000, 0x1f, 0x7, 0x5, 0x5, 0x7, 0x9, 0x3, 0x6, 0x100000000, 0x101}, {0x0, 0x105000, 0xe, 0x7, 0x2, 0x9, 0x5d0e, 0x3, 0x9, 0x401, 0x3, 0xffffffffffffffad}, {0x10f002, 0x4, 0xb, 0x1, 0x5, 0x1, 0x3, 0xfffffffffffffeff, 0xffffffffffff56a0, 0x7f, 0x1000, 0x1}, {0x2, 0x4000, 0x4, 0x800, 0x9, 0x0, 0x0, 0x3, 0x7, 0xffff, 0x4, 0x80000001}, {0x10000, 0x0, 0x1e, 0x800, 0x100, 0x800, 0xffffffffffffffff, 0x401, 0x99, 0x0, 0x7f800, 0x10000}, {0x1f006, 0x1f002, 0xc, 0x4, 0x0, 0x8, 0x8000, 0x800, 0x100000001, 0x0, 0x3, 0x5}, {0x110000, 0x6000, 0x0, 0x0, 0x2e, 0xc4c2, 0x7ff, 0x6, 0x9, 0xbb73, 0x401, 0xcc3}, {0x100000}, {0x1002, 0xd000}, 0x80000000, 0x0, 0x100000, 0x43, 0x7, 0x800, 0x103000, [0x2, 0x4831, 0x1771000, 0x3ff]}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000000)=0x2) 14:44:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xf0ffffff7f0000]}}, 0x1c) geteuid() 14:44:59 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) [ 1903.520157][T22973] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1903.539747][T22973] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1903.548146][T22973] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1903.556107][T22973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1903.564069][T22973] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1903.572026][T22973] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1903.580012][T22973] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1903.644342][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:44:59 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x406, r0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:44:59 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000100)=0x80) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000200)={'TPROXY\x00'}, &(0x7f0000000240)=0x1e) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000280), &(0x7f00000002c0)) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)=0x2) 14:44:59 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)={{0xcc, 0x43, 0xffffffffffffff31, 0x369, 0x2f3, 0x3ff, 0x1e9, 0x3}, "26d3effbccc9e1096d917d45811965fd6dea01b889f2481c95dde17b0812333744f9cc3b9a407da703b47a0f98441637ad38017443f29675c8b33d0aacade39b7cc8fdbab6bc8a8420e9e67bff1737ffbb9e4f50659318179efb63137bff82b3bdc4896e6dfee444f6cf2b7914380703311be94daf0281ce7dec4fc627cc7045035b090be53a9b9212", [[], [], [], [], [], [], []]}, 0x7a9) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r2, 0x400442c9, &(0x7f0000000080)={0x3}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40, 0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4110008}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000228bd7000fbdbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100a880f557b13f909329a1584f6877dbffc724583e8c6d88cb751192a7ac40af1fc7695f00c320bd92045806635dcbb08a6c255f72eb0f77001743dfbde21bfa7039a2ac3375a556f0272bf6eca95666989711fc3d66c10e603fa905c2a2de9810b5d2fe1799ffe95ade", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x20000004) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:45:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x100000000000000]}}, 0x1c) geteuid() 14:45:00 executing program 2 (fault-call:2 fault-nth:17): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:45:00 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x42180, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) bind$can_raw(r1, &(0x7f0000000080), 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000001c0)=0xc) write$FUSE_LK(r1, &(0x7f0000000200)={0x28, 0x0, 0x1, {{0x3, 0x1, 0x3, r2}}}, 0x28) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x100007, 0x4, 0x1, r0}) 14:45:00 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400000, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000100)={0x14, 0x13, 0x1, {0x98, 0x2, 0x3}}, 0x14) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x105800) ioctl$BLKBSZSET(r2, 0x40041271, &(0x7f0000000080)=0x7ff) 14:45:00 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7b9, 0x20000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, r1}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) dup3(r0, r2, 0x0) [ 1904.043704][T23719] FAULT_INJECTION: forcing a failure. [ 1904.043704][T23719] name failslab, interval 1, probability 0, space 0, times 0 [ 1904.056999][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1904.086539][T23719] CPU: 1 PID: 23719 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1904.094600][T23719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1904.105168][T23719] Call Trace: [ 1904.108524][T23719] dump_stack+0x172/0x1f0 [ 1904.112899][T23719] should_fail.cold+0xa/0x15 [ 1904.117523][T23719] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1904.123361][T23719] ? ___might_sleep+0x163/0x280 [ 1904.128251][T23719] __should_failslab+0x121/0x190 [ 1904.133301][T23719] should_failslab+0x9/0x14 [ 1904.137826][T23719] kmem_cache_alloc+0x2b2/0x6f0 [ 1904.142710][T23719] ? alloc_pages_current+0x10f/0x210 [ 1904.148044][T23719] __pmd_alloc+0xc9/0x460 [ 1904.152389][T23719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1904.158664][T23719] __handle_mm_fault+0x192a/0x3ec0 [ 1904.163799][T23719] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1904.169362][T23719] ? find_held_lock+0x35/0x130 [ 1904.174172][T23719] ? handle_mm_fault+0x322/0xb30 [ 1904.179140][T23719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.185414][T23719] ? kasan_check_read+0x11/0x20 [ 1904.190293][T23719] handle_mm_fault+0x43f/0xb30 [ 1904.195084][T23719] __get_user_pages+0x7b6/0x1a40 [ 1904.200055][T23719] ? follow_page_mask+0x19a0/0x19a0 [ 1904.205285][T23719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.211563][T23719] ? fsnotify+0xbc0/0xbc0 [ 1904.211585][T23719] get_user_pages_remote+0x21d/0x440 [ 1904.221408][T23719] copy_strings.isra.0+0x3dc/0x890 [ 1904.226633][T23719] ? remove_arg_zero+0x590/0x590 [ 1904.226648][T23719] ? prepare_binprm+0x6aa/0x940 [ 1904.226662][T23719] ? lock_downgrade+0x880/0x880 [ 1904.226674][T23719] ? vma_link+0x117/0x180 [ 1904.226689][T23719] ? install_exec_creds+0x180/0x180 [ 1904.226708][T23719] copy_strings_kernel+0xa5/0x110 [ 1904.226730][T23719] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1904.226757][T23719] ? copy_strings_kernel+0x110/0x110 [ 1904.226771][T23719] ? strncpy_from_user+0x2a8/0x380 [ 1904.226795][T23719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.278811][T23719] __ia32_compat_sys_execveat+0xf3/0x140 [ 1904.285779][T23719] do_fast_syscall_32+0x281/0xc98 [ 1904.290836][T23719] entry_SYSENTER_compat+0x70/0x7f [ 1904.295969][T23719] RIP: 0023:0xf7f71869 [ 1904.300054][T23719] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1904.319683][T23719] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1904.328117][T23719] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:45:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x200000000000000]}}, 0x1c) geteuid() 14:45:00 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x1, 0xffffffffffffff9c}) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000280)=""/205, &(0x7f0000000380)=0xcd) r3 = dup3(r0, r1, 0x0) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000003c0)) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000080)={0x80000000, 0x0, [], {0x0, @bt={0x9d3, 0x5, 0x1, 0x2, 0x7, 0x7, 0x8, 0x1, 0x9, 0x3, 0x4, 0x0, 0x1, 0xff, 0x2, 0x2}}}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x8, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000001c0)={r4, 0x0, 0x10, 0x7, 0x5}, &(0x7f0000000200)=0x18) 14:45:00 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x8000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x1000000480043, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0205710, &(0x7f00000000c0)={0x0, 0x5, 0x1f, 0x9}) [ 1904.336107][T23719] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1904.344103][T23719] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1904.352181][T23719] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1904.360175][T23719] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:00 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x10, 0x2e, 0x1, 0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffff9c}) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000100)=@buf) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/bnep\x00') setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000080)={0x4, 0xfffffffffffffffd, 0xe706, 0x3, 0x4, 0x2, 0x5, 0x4, 0xffff, 0x9, 0x8}, 0xb) dup3(r0, r1, 0x0) [ 1904.387694][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:45:00 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1c1000, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc2cd29313b8f6953}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x800, 0x70bd27, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4000) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:00 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000097f02f0cf4e498b528ab5b868f63fab8bafc0fbdfbe95fa98467a93e417b71a263beb6217c09b9fd86319e19d78dc421a28374a0"], @ANYBLOB='\x00'/36], 0x70) 14:45:00 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f00000005c0)={"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"}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:45:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x300000000000000]}}, 0x1c) geteuid() 14:45:00 executing program 2 (fault-call:2 fault-nth:18): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1904.613699][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:45:00 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8004700b, &(0x7f0000000080)) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x100) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r2, r2, 0x6, 0x3}, 0x10) fstatfs(r3, &(0x7f00000001c0)=""/240) 14:45:00 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.impure\x00', &(0x7f0000000100)='keyring\x00', 0x8, 0x3) 14:45:00 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x20000) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000000)=0x2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @aes256, 0x2, "3a5eac3880ee4df3"}) 14:45:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x400000000000000]}}, 0x1c) geteuid() [ 1904.746997][T24683] FAULT_INJECTION: forcing a failure. [ 1904.746997][T24683] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1904.810919][T24683] CPU: 1 PID: 24683 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1904.818964][T24683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1904.829037][T24683] Call Trace: [ 1904.832367][T24683] dump_stack+0x172/0x1f0 [ 1904.836816][T24683] should_fail.cold+0xa/0x15 [ 1904.841445][T24683] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1904.847283][T24683] ? ___might_sleep+0x163/0x280 [ 1904.852256][T24683] should_fail_alloc_page+0x50/0x60 [ 1904.857487][T24683] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1904.863225][T24683] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1904.868968][T24683] ? kasan_check_write+0x14/0x20 [ 1904.873944][T24683] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1904.880216][T24683] alloc_pages_current+0x107/0x210 [ 1904.885374][T24683] pte_alloc_one+0x1b/0x1a0 [ 1904.886155][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1904.898756][T24683] __pte_alloc+0x20/0x310 [ 1904.898776][T24683] __handle_mm_fault+0x3391/0x3ec0 [ 1904.898797][T24683] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1904.898811][T24683] ? find_held_lock+0x35/0x130 [ 1904.898830][T24683] ? handle_mm_fault+0x322/0xb30 [ 1904.935912][T24683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.942178][T24683] ? kasan_check_read+0x11/0x20 [ 1904.947147][T24683] handle_mm_fault+0x43f/0xb30 [ 1904.951954][T24683] __get_user_pages+0x7b6/0x1a40 [ 1904.956935][T24683] ? follow_page_mask+0x19a0/0x19a0 [ 1904.962148][T24683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1904.968444][T24683] ? fsnotify+0xbc0/0xbc0 [ 1904.972811][T24683] get_user_pages_remote+0x21d/0x440 [ 1904.978258][T24683] copy_strings.isra.0+0x3dc/0x890 [ 1904.983405][T24683] ? remove_arg_zero+0x590/0x590 [ 1904.988369][T24683] ? prepare_binprm+0x6aa/0x940 [ 1904.993235][T24683] ? lock_downgrade+0x880/0x880 [ 1904.998101][T24683] ? vma_link+0x117/0x180 [ 1905.002448][T24683] ? install_exec_creds+0x180/0x180 14:45:01 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeec, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40000, 0x1) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f00000001c0)={{0xfffffffffffffff8, 0x1}, {0xffffffffffffffe1, 0x9}, 0x3ff, 0x4, 0x2}) setgid(r2) 14:45:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x500000000000000]}}, 0x1c) geteuid() [ 1905.007667][T24683] copy_strings_kernel+0xa5/0x110 [ 1905.012719][T24683] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1905.018397][T24683] ? copy_strings_kernel+0x110/0x110 [ 1905.023707][T24683] ? strncpy_from_user+0x2a8/0x380 [ 1905.028843][T24683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.035152][T24683] __ia32_compat_sys_execveat+0xf3/0x140 [ 1905.040812][T24683] do_fast_syscall_32+0x281/0xc98 [ 1905.045869][T24683] entry_SYSENTER_compat+0x70/0x7f [ 1905.051024][T24683] RIP: 0023:0xf7f71869 [ 1905.051040][T24683] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1905.051053][T24683] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1905.074812][T24683] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1905.074820][T24683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1905.074827][T24683] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:45:01 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)=0x2) [ 1905.074834][T24683] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1905.074841][T24683] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1905.081688][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:45:01 executing program 2 (fault-call:2 fault-nth:19): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:45:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:45:01 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000080)={0x14, 0x11, 0x2, {0x5, 0x4, 0x4}}, 0x14) 14:45:01 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000001c0)={0x1ff, 0x7, 0x4, 0x80000000, 0x2d, 0x50d, 0xfffffffffffff000, 0x10001, 0x0}, &(0x7f0000000200)=0x20) fcntl$setflags(r2, 0x2, 0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) [ 1905.290553][T25282] FAULT_INJECTION: forcing a failure. [ 1905.290553][T25282] name failslab, interval 1, probability 0, space 0, times 0 14:45:01 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7a, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0xffffffffffffffff}) dup3(r0, r2, 0x0) [ 1905.345570][T25282] CPU: 1 PID: 25282 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1905.353601][T25282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1905.363670][T25282] Call Trace: [ 1905.363700][T25282] dump_stack+0x172/0x1f0 [ 1905.363724][T25282] should_fail.cold+0xa/0x15 [ 1905.375943][T25282] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1905.381781][T25282] ? ___might_sleep+0x163/0x280 [ 1905.386760][T25282] __should_failslab+0x121/0x190 [ 1905.391717][T25282] should_failslab+0x9/0x14 [ 1905.396241][T25282] kmem_cache_alloc+0x2b2/0x6f0 [ 1905.401122][T25282] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1905.407397][T25282] ptlock_alloc+0x20/0x70 [ 1905.411763][T25282] pte_alloc_one+0x6d/0x1a0 [ 1905.416307][T25282] __pte_alloc+0x20/0x310 [ 1905.421450][T25282] __handle_mm_fault+0x3391/0x3ec0 [ 1905.421474][T25282] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1905.421490][T25282] ? find_held_lock+0x35/0x130 [ 1905.421509][T25282] ? handle_mm_fault+0x322/0xb30 [ 1905.441971][T25282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.448278][T25282] ? kasan_check_read+0x11/0x20 [ 1905.448319][T25282] handle_mm_fault+0x43f/0xb30 [ 1905.448340][T25282] __get_user_pages+0x7b6/0x1a40 [ 1905.462914][T25282] ? follow_page_mask+0x19a0/0x19a0 [ 1905.468140][T25282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.474508][T25282] ? fsnotify+0xbc0/0xbc0 [ 1905.478870][T25282] get_user_pages_remote+0x21d/0x440 [ 1905.484195][T25282] copy_strings.isra.0+0x3dc/0x890 [ 1905.489353][T25282] ? remove_arg_zero+0x590/0x590 [ 1905.494348][T25282] ? prepare_binprm+0x6aa/0x940 [ 1905.499218][T25282] ? lock_downgrade+0x880/0x880 [ 1905.504087][T25282] ? vma_link+0x117/0x180 [ 1905.508437][T25282] ? install_exec_creds+0x180/0x180 [ 1905.513659][T25282] copy_strings_kernel+0xa5/0x110 [ 1905.518712][T25282] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1905.524461][T25282] ? copy_strings_kernel+0x110/0x110 [ 1905.529767][T25282] ? strncpy_from_user+0x2a8/0x380 [ 1905.534904][T25282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:45:01 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x20003, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xcc1f9b618d4841a8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, r3, 0x401, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x1a, 0x5, @l2={'ib', 0x3a, 'bcsf0\x00'}}}}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x800) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x6, 0x20}, &(0x7f0000000280)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={r4, 0x5}, 0x8) [ 1905.541174][T25282] __ia32_compat_sys_execveat+0xf3/0x140 [ 1905.546834][T25282] do_fast_syscall_32+0x281/0xc98 [ 1905.551897][T25282] entry_SYSENTER_compat+0x70/0x7f [ 1905.557028][T25282] RIP: 0023:0xf7f71869 [ 1905.561105][T25282] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1905.580812][T25282] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 14:45:01 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x60000, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x40, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f00000001c0)={0xfffffffffffffff8, 0x1}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x440000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='$\x9avmnet0wlan0ppp0@selinuxnodevlo\x00', r3}, 0x10) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000200)=0x2, 0x4) 14:45:01 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x10000001, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x101000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) accept4$tipc(r1, 0x0, &(0x7f00000003c0), 0x800) write$FUSE_ATTR(r1, &(0x7f0000000300)={0x78, 0x0, 0x1, {0x3, 0x5, 0x0, {0x5, 0x100000001, 0x80000000, 0x80000000, 0xc12, 0x5, 0x2, 0x80000000, 0xfff, 0xff, 0x9, r3, r4, 0x7f, 0x5}}}, 0x78) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) dup3(r0, r2, 0x0) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000240)='/dev/ion\x00', 0x9) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, 0x0) 14:45:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x600000000000000]}}, 0x1c) geteuid() [ 1905.580827][T25282] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1905.580834][T25282] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1905.580848][T25282] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1905.580856][T25282] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1905.580865][T25282] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:01 executing program 2 (fault-call:2 fault-nth:20): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1905.698889][T25573] FAULT_INJECTION: forcing a failure. [ 1905.698889][T25573] name failslab, interval 1, probability 0, space 0, times 0 [ 1905.713250][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1905.832496][T25573] CPU: 0 PID: 25573 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1905.840528][T25573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1905.850758][T25573] Call Trace: [ 1905.854091][T25573] dump_stack+0x172/0x1f0 [ 1905.858468][T25573] should_fail.cold+0xa/0x15 [ 1905.863094][T25573] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1905.868923][T25573] ? ___might_sleep+0x163/0x280 [ 1905.868947][T25573] __should_failslab+0x121/0x190 [ 1905.868963][T25573] should_failslab+0x9/0x14 [ 1905.868980][T25573] kmem_cache_alloc+0x2b2/0x6f0 [ 1905.868995][T25573] ? __might_sleep+0x95/0x190 [ 1905.869015][T25573] __anon_vma_prepare+0x62/0x3c0 [ 1905.878788][T25573] ? __pte_alloc+0x1ba/0x310 [ 1905.878809][T25573] __handle_mm_fault+0x34db/0x3ec0 [ 1905.878831][T25573] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1905.878848][T25573] ? find_held_lock+0x35/0x130 [ 1905.878862][T25573] ? handle_mm_fault+0x322/0xb30 [ 1905.878887][T25573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.878904][T25573] ? kasan_check_read+0x11/0x20 [ 1905.878923][T25573] handle_mm_fault+0x43f/0xb30 [ 1905.938570][T25573] __get_user_pages+0x7b6/0x1a40 [ 1905.943517][T25573] ? follow_page_mask+0x19a0/0x19a0 [ 1905.948734][T25573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1905.954990][T25573] ? fsnotify+0xbc0/0xbc0 [ 1905.959331][T25573] get_user_pages_remote+0x21d/0x440 [ 1905.964640][T25573] copy_strings.isra.0+0x3dc/0x890 [ 1905.969754][T25573] ? remove_arg_zero+0x590/0x590 [ 1905.974698][T25573] ? prepare_binprm+0x6aa/0x940 [ 1905.979541][T25573] ? lock_downgrade+0x880/0x880 [ 1905.984381][T25573] ? vma_link+0x117/0x180 [ 1905.988706][T25573] ? install_exec_creds+0x180/0x180 [ 1905.993919][T25573] copy_strings_kernel+0xa5/0x110 [ 1905.998942][T25573] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1906.004582][T25573] ? copy_strings_kernel+0x110/0x110 [ 1906.009862][T25573] ? strncpy_from_user+0x2a8/0x380 [ 1906.014992][T25573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.021243][T25573] __ia32_compat_sys_execveat+0xf3/0x140 [ 1906.026883][T25573] do_fast_syscall_32+0x281/0xc98 [ 1906.031908][T25573] entry_SYSENTER_compat+0x70/0x7f [ 1906.037009][T25573] RIP: 0023:0xf7f71869 [ 1906.041073][T25573] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1906.060685][T25573] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1906.069180][T25573] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:45:02 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000080)=0x5) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f0000000040)=0x5) 14:45:02 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x200, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x0, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) fcntl$setownex(r2, 0xf, &(0x7f00000000c0)={0x0, r3}) [ 1906.077148][T25573] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1906.085112][T25573] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1906.093076][T25573] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1906.101037][T25573] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:02 executing program 4: syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r0, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) 14:45:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x700000000000000]}}, 0x1c) geteuid() 14:45:02 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r4) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f00000000c0)={0x6, 0x20}) 14:45:02 executing program 2 (fault-call:2 fault-nth:21): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1906.248655][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:45:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) write$9p(r2, &(0x7f0000000040)="0e1a09d24dde7c25e71d1f2a61e90253dc4b178771ed5d89eb98423b025c2914cb9fa18ca386b33bc0a702744745009a40293eba2728a43bd82cfb4b644c8858e6d94e866508182ddafb611664cc4a55677d227e05d5dbd0ec680bf5a4c2f3e481cc374baa5dfcb6ba69e0217d87e16937b4744641bd31", 0x77) [ 1906.363311][T26212] FAULT_INJECTION: forcing a failure. [ 1906.363311][T26212] name failslab, interval 1, probability 0, space 0, times 0 [ 1906.382801][T26212] CPU: 1 PID: 26212 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1906.390834][T26212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1906.400905][T26212] Call Trace: [ 1906.404232][T26212] dump_stack+0x172/0x1f0 [ 1906.408591][T26212] should_fail.cold+0xa/0x15 [ 1906.413214][T26212] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1906.419132][T26212] ? ___might_sleep+0x163/0x280 [ 1906.424005][T26212] __should_failslab+0x121/0x190 [ 1906.428965][T26212] should_failslab+0x9/0x14 [ 1906.433489][T26212] kmem_cache_alloc+0x2b2/0x6f0 [ 1906.438364][T26212] ? __might_sleep+0x95/0x190 [ 1906.443059][T26212] __anon_vma_prepare+0x1b1/0x3c0 [ 1906.448109][T26212] ? __pte_alloc+0x1ba/0x310 [ 1906.452725][T26212] __handle_mm_fault+0x34db/0x3ec0 [ 1906.457863][T26212] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1906.463436][T26212] ? find_held_lock+0x35/0x130 [ 1906.468225][T26212] ? handle_mm_fault+0x322/0xb30 [ 1906.473343][T26212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.479606][T26212] ? kasan_check_read+0x11/0x20 [ 1906.484481][T26212] handle_mm_fault+0x43f/0xb30 [ 1906.489265][T26212] __get_user_pages+0x7b6/0x1a40 [ 1906.494238][T26212] ? follow_page_mask+0x19a0/0x19a0 [ 1906.499460][T26212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.505818][T26212] ? fsnotify+0xbc0/0xbc0 14:45:02 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x20400, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x82002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r3}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) getsockopt$sock_int(r4, 0x1, 0x0, &(0x7f0000000080), &(0x7f0000000140)=0x4) 14:45:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x800, 0x80000) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000040)) syz_genetlink_get_family_id$tipc(0x0) timer_create(0x3, &(0x7f0000000500)={0x0, 0x2, 0x0, @thr={&(0x7f0000000340)="13f44f460a40904f72245117fb276ba33450c9c82f3eb6c0d0ed1103fdf04b02373ff38c4430c8236cfddc58230a96085955dbfbea89fb87855410226a0dbe0663713d1d5426a0167a3ffd23edb1ae562377e0ed4728160ea8cdbd6989c9995e088abf6d969e82cd5afba5dc5044672e2ac2956215d7576b864202acbfa428431daa4b013154f05df599df10a93adda7235c5718", 0x0}}, &(0x7f0000000540)=0x0) timer_settime(r1, 0x1, &(0x7f00000005c0)={{}, {0x0, 0x989680}}, &(0x7f0000000600)) getdents(0xffffffffffffffff, &(0x7f0000001580)=""/4096, 0x1000) 14:45:02 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xa0d, 0x20400) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000100)={{0x2, 0x4e22, @local}, {0x6, @dev={[], 0x14}}, 0x6, {0x2, 0x4e22, @broadcast}, 'bcsh0\x00'}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) [ 1906.510345][T26212] get_user_pages_remote+0x21d/0x440 [ 1906.515650][T26212] copy_strings.isra.0+0x3dc/0x890 [ 1906.520783][T26212] ? remove_arg_zero+0x590/0x590 [ 1906.520800][T26212] ? prepare_binprm+0x6aa/0x940 [ 1906.520815][T26212] ? lock_downgrade+0x880/0x880 [ 1906.520832][T26212] ? vma_link+0x117/0x180 [ 1906.539804][T26212] ? install_exec_creds+0x180/0x180 [ 1906.545019][T26212] copy_strings_kernel+0xa5/0x110 [ 1906.545041][T26212] __do_execve_file.isra.0+0x10ef/0x23f0 [ 1906.545066][T26212] ? copy_strings_kernel+0x110/0x110 [ 1906.560988][T26212] ? strncpy_from_user+0x2a8/0x380 [ 1906.566131][T26212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1906.572387][T26212] __ia32_compat_sys_execveat+0xf3/0x140 [ 1906.578047][T26212] do_fast_syscall_32+0x281/0xc98 [ 1906.578069][T26212] entry_SYSENTER_compat+0x70/0x7f [ 1906.578080][T26212] RIP: 0023:0xf7f71869 [ 1906.578093][T26212] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:45:02 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xaeef, 0x32, 0x1, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8002) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0e05403, &(0x7f00000001c0)={{0x3, 0x3, 0x8, 0x3, 0x7}, 0x1, 0x3, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x80000000, 0x3f}) splice(r1, &(0x7f0000000040)=0xb, r1, &(0x7f0000000100)=0x47, 0x4, 0x4) [ 1906.578100][T26212] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1906.578113][T26212] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1906.578120][T26212] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1906.578126][T26212] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1906.578133][T26212] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1906.578141][T26212] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x800000000000000]}}, 0x1c) geteuid() 14:45:02 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)) [ 1906.673543][T26381] QAT: Invalid ioctl 14:45:02 executing program 2 (fault-call:2 fault-nth:22): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:45:02 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20800, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000080)=0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x11c, r4, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe01}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc247}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x10}, 0x1) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000400)=0x0) kcmp(r3, r5, 0x6, r1, r0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000100)={0x800100a, 0x4000000000000c6, 0x2}) prctl$PR_SET_SECUREBITS(0x1c, 0xbb55f35aa6ad64b2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:02 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x800, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x100000000000004, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) 14:45:03 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2004000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r3, 0x300, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x81}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) 14:45:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x900000000000000]}}, 0x1c) geteuid() [ 1906.988031][T26855] FAULT_INJECTION: forcing a failure. [ 1906.988031][T26855] name failslab, interval 1, probability 0, space 0, times 0 [ 1907.045675][T26855] CPU: 0 PID: 26855 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1907.053698][T26855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1907.063767][T26855] Call Trace: [ 1907.067081][T26855] dump_stack+0x172/0x1f0 [ 1907.071431][T26855] should_fail.cold+0xa/0x15 [ 1907.076866][T26855] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1907.082674][T26855] ? ___might_sleep+0x163/0x280 [ 1907.087530][T26855] __should_failslab+0x121/0x190 [ 1907.092470][T26855] should_failslab+0x9/0x14 [ 1907.096970][T26855] kmem_cache_alloc_trace+0x2d1/0x760 [ 1907.103282][T26855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1907.109613][T26855] tomoyo_find_next_domain+0xe4/0x1f8a [ 1907.115060][T26855] ? mark_held_locks+0xf0/0xf0 [ 1907.119820][T26855] ? __lockdep_free_key_range+0x120/0x120 [ 1907.125533][T26855] ? tomoyo_dump_page+0x510/0x510 [ 1907.130550][T26855] ? lock_acquire+0x16f/0x3f0 [ 1907.135237][T26855] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1907.141047][T26855] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1907.146755][T26855] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1907.152556][T26855] security_bprm_check+0x69/0xb0 [ 1907.157489][T26855] search_binary_handler+0x77/0x570 [ 1907.162681][T26855] ? kasan_check_read+0x11/0x20 [ 1907.167536][T26855] __do_execve_file.isra.0+0x1394/0x23f0 [ 1907.173193][T26855] ? copy_strings_kernel+0x110/0x110 [ 1907.178474][T26855] ? strncpy_from_user+0x2a8/0x380 [ 1907.183585][T26855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1907.189827][T26855] __ia32_compat_sys_execveat+0xf3/0x140 [ 1907.195459][T26855] do_fast_syscall_32+0x281/0xc98 [ 1907.200483][T26855] entry_SYSENTER_compat+0x70/0x7f [ 1907.205586][T26855] RIP: 0023:0xf7f71869 [ 1907.209647][T26855] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1907.229351][T26855] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1907.238287][T26855] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:45:03 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) ioprio_set$pid(0x0, r0, 0xfffffffd) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) r3 = fcntl$dupfd(r1, 0x0, r2) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000080), &(0x7f0000000100)=0x8) 14:45:03 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x40a000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={0x0, 0x8001}, &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x80000001, 0x2, 0x2, 0x10000, 0x21}, &(0x7f0000000140)=0x98) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000000)=0x14048) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000340)=""/45) ioctl$VIDIOC_S_EDID(r1, 0xc0245629, &(0x7f00000003c0)={0x0, 0x0, 0x80000000, [], &(0x7f0000000380)=0x1}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000180)=0x6) r4 = request_key(&(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)=',wlan1\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)="18418a0d95451b32e39f199cc677b16121511882e30b105e83faf81c209cd3b51d355e4c9fd1fe5b44c8ca81fe62c7b18777f2c6c4a20077772014616730f3ecab10022687b0dfaf6f8963756033b49415e9d33a603880ba38f8858076b20c8ae1b800080b6c1938e736b7ec80b5fb9df787ee65ffc342a33ce9ea9409943dfffb45bbe1ffb439b0ee10c60e91df474a4fd56ec93776bbb6045a6126c0bff89f1a8f50a90813fa837e8aef29631d27fe593fe9e22686232c0f2619e4f8cf6ce1093a33b1c7553ddcbe0eb02029b21aa18e9d2f712648734c8bbd22fa191d4059c089a9fdc2ad4cfad39d", 0xea, r4) [ 1907.246249][T26855] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1907.254229][T26855] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1907.262192][T26855] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1907.270160][T26855] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:03 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x40a000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={0x0, 0x8001}, &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x80000001, 0x2, 0x2, 0x10000, 0x21}, &(0x7f0000000140)=0x98) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000000)=0x14048) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000340)=""/45) ioctl$VIDIOC_S_EDID(r1, 0xc0245629, &(0x7f00000003c0)={0x0, 0x0, 0x80000000, [], &(0x7f0000000380)=0x1}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000180)=0x6) r4 = request_key(&(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)=',wlan1\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)="18418a0d95451b32e39f199cc677b16121511882e30b105e83faf81c209cd3b51d355e4c9fd1fe5b44c8ca81fe62c7b18777f2c6c4a20077772014616730f3ecab10022687b0dfaf6f8963756033b49415e9d33a603880ba38f8858076b20c8ae1b800080b6c1938e736b7ec80b5fb9df787ee65ffc342a33ce9ea9409943dfffb45bbe1ffb439b0ee10c60e91df474a4fd56ec93776bbb6045a6126c0bff89f1a8f50a90813fa837e8aef29631d27fe593fe9e22686232c0f2619e4f8cf6ce1093a33b1c7553ddcbe0eb02029b21aa18e9d2f712648734c8bbd22fa191d4059c089a9fdc2ad4cfad39d", 0xea, r4) 14:45:03 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x8, 0x0, 0xffffffffffffff9c}) r1 = semget(0x0, 0x1, 0xe0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f00000001c0)=""/218) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000100)=""/99) r2 = getuid() ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r2) 14:45:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xa00000000000000]}}, 0x1c) geteuid() 14:45:03 executing program 2 (fault-call:2 fault-nth:23): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:45:03 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x10) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r2 = dup3(r0, r0, 0x80000) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0x401, 0x100020000001, 0x0, r2}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) 14:45:03 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000000)={0x0, 0x0, 0x5, 0x80800, 0xffffffffffffff9c}) 14:45:03 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x101000) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000140)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0xdc05b45530ef05c8, 0x0) write$FUSE_IOCTL(r2, &(0x7f00000000c0)={0x20, 0xffffffffffffffda, 0x4, {0x5, 0x4, 0x5, 0x7}}, 0x20) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) 14:45:03 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x800, 0x0) ioctl$NBD_CLEAR_QUE(r2, 0xab05) dup3(r0, r1, 0x0) 14:45:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xe00000000000000]}}, 0x1c) geteuid() [ 1907.644735][T27459] FAULT_INJECTION: forcing a failure. [ 1907.644735][T27459] name failslab, interval 1, probability 0, space 0, times 0 [ 1907.658129][T27459] CPU: 0 PID: 27459 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1907.666140][T27459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1907.676209][T27459] Call Trace: [ 1907.679519][T27459] dump_stack+0x172/0x1f0 [ 1907.683868][T27459] should_fail.cold+0xa/0x15 [ 1907.688477][T27459] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1907.694304][T27459] ? ___might_sleep+0x163/0x280 [ 1907.699181][T27459] __should_failslab+0x121/0x190 [ 1907.704135][T27459] should_failslab+0x9/0x14 [ 1907.708653][T27459] kmem_cache_alloc_trace+0x2d1/0x760 [ 1907.714035][T27459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1907.720304][T27459] tomoyo_find_next_domain+0xe4/0x1f8a [ 1907.725782][T27459] ? mark_held_locks+0xf0/0xf0 [ 1907.730646][T27459] ? __lock_acquire+0x548/0x3fb0 [ 1907.735616][T27459] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1907.741883][T27459] ? tomoyo_dump_page+0x510/0x510 [ 1907.746921][T27459] ? lock_acquire+0x16f/0x3f0 [ 1907.751605][T27459] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1907.757427][T27459] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1907.763166][T27459] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1907.769082][T27459] security_bprm_check+0x69/0xb0 [ 1907.774050][T27459] search_binary_handler+0x77/0x570 [ 1907.779276][T27459] ? kasan_check_read+0x11/0x20 [ 1907.784140][T27459] __do_execve_file.isra.0+0x1394/0x23f0 [ 1907.789801][T27459] ? copy_strings_kernel+0x110/0x110 [ 1907.795095][T27459] ? strncpy_from_user+0x2a8/0x380 [ 1907.795117][T27459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1907.795139][T27459] __ia32_compat_sys_execveat+0xf3/0x140 [ 1907.795166][T27459] do_fast_syscall_32+0x281/0xc98 [ 1907.795186][T27459] entry_SYSENTER_compat+0x70/0x7f [ 1907.822262][T27459] RIP: 0023:0xf7f71869 14:45:03 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, &(0x7f00000000c0)=0x3) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000100)) 14:45:03 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xaeef, 0x1, 0x1, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:45:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x1000000000000000]}}, 0x1c) geteuid() 14:45:03 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x40a000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x3) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={0x0, 0x8001}, &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x80000001, 0x2, 0x2, 0x10000, 0x21}, &(0x7f0000000140)=0x98) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000000)=0x14048) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000340)=""/45) ioctl$VIDIOC_S_EDID(r1, 0xc0245629, &(0x7f00000003c0)={0x0, 0x0, 0x80000000, [], &(0x7f0000000380)=0x1}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000180)=0x6) r4 = request_key(&(0x7f0000000580)='syzkaller\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)=',wlan1\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)="18418a0d95451b32e39f199cc677b16121511882e30b105e83faf81c209cd3b51d355e4c9fd1fe5b44c8ca81fe62c7b18777f2c6c4a20077772014616730f3ecab10022687b0dfaf6f8963756033b49415e9d33a603880ba38f8858076b20c8ae1b800080b6c1938e736b7ec80b5fb9df787ee65ffc342a33ce9ea9409943dfffb45bbe1ffb439b0ee10c60e91df474a4fd56ec93776bbb6045a6126c0bff89f1a8f50a90813fa837e8aef29631d27fe593fe9e22686232c0f2619e4f8cf6ce1093a33b1c7553ddcbe0eb02029b21aa18e9d2f712648734c8bbd22fa191d4059c089a9fdc2ad4cfad39d", 0xea, r4) 14:45:03 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000800)='/dev/snd/pcmC#D#p\x00', 0x2, 0x440000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000840)=0x10001, 0x4) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000000)) dup3(r0, r2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x200000, 0x0) [ 1907.822277][T27459] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1907.822285][T27459] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1907.822299][T27459] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1907.822306][T27459] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1907.822318][T27459] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1907.846180][T27459] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1907.846190][T27459] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1907.891827][ C0] net_ratelimit: 4 callbacks suppressed [ 1907.891837][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:45:04 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0xfffffffffffffffb, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x7) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) wait4(r2, &(0x7f0000000240), 0x80000000, &(0x7f0000000280)) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x40, 0x200) ioctl$VIDIOC_QUERY_EXT_CTRL(r3, 0xc0e85667, &(0x7f0000000140)={0x80000000, 0x106, "23be495c25b1bdaa131b162695118920a4509ac2ac8559a1f785777e13e07b4f", 0x91, 0x3, 0x47d, 0x1, 0x2a112e22, 0xffffffff, 0x7, 0x7, [0x81, 0x3f, 0x6, 0x1]}) 14:45:04 executing program 2 (fault-call:2 fault-nth:24): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:45:04 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xaeef, 0x1, 0x1, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:45:04 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f00000001c0)={0xd, 0x8, 0x24, "4a78e6726b1dec1471e415fad9a7f206b14d5b30bc4b6c5c644b38f0eb64e75afc8d8a34565da56c79b8ef75e9d105bbe171bb330053cb39fb17d991", 0x30, "c1e935a8e8da3433440903021f0912da1f4d32100d6cc06763f607790f9e768efa8dfc216f0a0e12ad432be80e0b913d46818ba35b3ad3cc94855482", 0xe0}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x100, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000000)={0xaeef, 0x20, 0x8000000000, r2}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f00000000c0)=0x3) [ 1908.107754][T28047] FAULT_INJECTION: forcing a failure. [ 1908.107754][T28047] name failslab, interval 1, probability 0, space 0, times 0 [ 1908.124883][T28047] CPU: 1 PID: 28047 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1908.132907][T28047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1908.143071][T28047] Call Trace: [ 1908.146382][T28047] dump_stack+0x172/0x1f0 [ 1908.150737][T28047] should_fail.cold+0xa/0x15 14:45:04 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) readahead(r0, 0x2, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:04 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x25, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x202200, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0xef}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000140)={r3, 0x8}, &(0x7f00000001c0)=0x8) 14:45:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x1400000000000000]}}, 0x1c) geteuid() 14:45:04 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) fcntl$setown(r1, 0x8, r3) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x80000) [ 1908.155344][T28047] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1908.161175][T28047] ? ___might_sleep+0x163/0x280 [ 1908.166039][T28047] __should_failslab+0x121/0x190 [ 1908.171012][T28047] should_failslab+0x9/0x14 [ 1908.171029][T28047] kmem_cache_alloc+0x2b2/0x6f0 [ 1908.171066][T28047] getname_kernel+0x53/0x370 [ 1908.184983][T28047] kern_path+0x20/0x40 [ 1908.189079][T28047] tomoyo_realpath_nofollow+0x74/0xdb [ 1908.194466][T28047] ? tomoyo_realpath_from_path+0x730/0x730 [ 1908.200278][T28047] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1908.200296][T28047] ? tomoyo_init_request_info+0x105/0x1d0 [ 1908.200317][T28047] tomoyo_find_next_domain+0x28c/0x1f8a [ 1908.200334][T28047] ? mark_held_locks+0xf0/0xf0 [ 1908.200349][T28047] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1908.200369][T28047] ? tomoyo_dump_page+0x510/0x510 [ 1908.233859][T28047] ? lock_acquire+0x16f/0x3f0 [ 1908.233876][T28047] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1908.233899][T28047] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1908.233912][T28047] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1908.233930][T28047] security_bprm_check+0x69/0xb0 [ 1908.233950][T28047] search_binary_handler+0x77/0x570 [ 1908.256044][T28047] ? kasan_check_read+0x11/0x20 [ 1908.256074][T28047] __do_execve_file.isra.0+0x1394/0x23f0 [ 1908.256098][T28047] ? copy_strings_kernel+0x110/0x110 [ 1908.256113][T28047] ? strncpy_from_user+0x2a8/0x380 [ 1908.256131][T28047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.256150][T28047] __ia32_compat_sys_execveat+0xf3/0x140 [ 1908.256171][T28047] do_fast_syscall_32+0x281/0xc98 [ 1908.256192][T28047] entry_SYSENTER_compat+0x70/0x7f [ 1908.256202][T28047] RIP: 0023:0xf7f71869 [ 1908.256218][T28047] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1908.271165][T28047] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1908.271179][T28047] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1908.271188][T28047] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 14:45:04 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x800) write$FUSE_LSEEK(r2, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x8, {0x6}}, 0x18) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:04 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1}) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x98) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) prctl$PR_SET_DUMPABLE(0x4, 0x3) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, 0x0, 0x10af494921015e42, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000110) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x2) dup3(r3, r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000040)) 14:45:04 executing program 2 (fault-call:2 fault-nth:25): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:45:04 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) r3 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="1c9faf81b9df9dafe1dc0267f86e96eb2c6e32bb7cd4b09ff195ba106da9ea73ba9edc184813712c02ff1236b49bd8af44666feb44c5e8b45edc83ea53971f5951a63ca6025cc40dde612b2e0a82fd3838a995835dae44c211d6884642a60b9901f5c0", 0x63, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r3, 0x1) mq_getsetattr(r2, &(0x7f0000000000)={0x400, 0x80000001, 0x0, 0x9, 0x4, 0x7fff, 0x8, 0x6}, 0x0) [ 1908.271196][T28047] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1908.271204][T28047] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1908.271212][T28047] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1908.281951][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:45:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x1802000000000000]}}, 0x1c) geteuid() [ 1908.423473][T28269] FAULT_INJECTION: forcing a failure. [ 1908.423473][T28269] name failslab, interval 1, probability 0, space 0, times 0 [ 1908.541378][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1908.561622][T28269] CPU: 1 PID: 28269 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1908.569646][T28269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1908.579713][T28269] Call Trace: [ 1908.583011][T28269] dump_stack+0x172/0x1f0 [ 1908.587371][T28269] should_fail.cold+0xa/0x15 [ 1908.591983][T28269] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1908.597828][T28269] ? ___might_sleep+0x163/0x280 [ 1908.602701][T28269] __should_failslab+0x121/0x190 [ 1908.607668][T28269] should_failslab+0x9/0x14 [ 1908.612183][T28269] kmem_cache_alloc+0x2b2/0x6f0 [ 1908.617057][T28269] getname_kernel+0x53/0x370 [ 1908.621656][T28269] kern_path+0x20/0x40 [ 1908.625733][T28269] tomoyo_realpath_nofollow+0x74/0xdb [ 1908.631120][T28269] ? tomoyo_realpath_from_path+0x730/0x730 [ 1908.636936][T28269] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1908.643175][T28269] ? tomoyo_init_request_info+0x105/0x1d0 [ 1908.648908][T28269] tomoyo_find_next_domain+0x28c/0x1f8a [ 1908.654457][T28269] ? mark_held_locks+0xf0/0xf0 [ 1908.659233][T28269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1908.665493][T28269] ? tomoyo_dump_page+0x510/0x510 [ 1908.670527][T28269] ? lock_acquire+0x16f/0x3f0 [ 1908.675213][T28269] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1908.681054][T28269] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1908.686785][T28269] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1908.692604][T28269] security_bprm_check+0x69/0xb0 [ 1908.697557][T28269] search_binary_handler+0x77/0x570 [ 1908.702773][T28269] ? kasan_check_read+0x11/0x20 [ 1908.707640][T28269] __do_execve_file.isra.0+0x1394/0x23f0 [ 1908.713293][T28269] ? copy_strings_kernel+0x110/0x110 [ 1908.718591][T28269] ? strncpy_from_user+0x2a8/0x380 [ 1908.723713][T28269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1908.729963][T28269] __ia32_compat_sys_execveat+0xf3/0x140 [ 1908.735618][T28269] do_fast_syscall_32+0x281/0xc98 14:45:04 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000080)=""/147, 0x130000, 0x1800, 0x800}, 0x18) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x1, 0x3d, 0x0, 0xffffffffffffff9c}) dup3(r0, r1, 0x0) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=@random={'osx.', '/dev/ion\x00'}, &(0x7f0000000200)='/dev/ion\x00', 0x9, 0x2) [ 1908.740672][T28269] entry_SYSENTER_compat+0x70/0x7f [ 1908.745782][T28269] RIP: 0023:0xf7f71869 [ 1908.749853][T28269] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1908.769465][T28269] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1908.777880][T28269] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:45:04 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000001c0)) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() setregid(r3, r4) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:04 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'rose0\x00', r1}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x800001, 0x0) acct(&(0x7f0000000000)='./file0\x00') ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000080)=""/35) dup3(r2, r3, 0x0) 14:45:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x2000000000000000]}}, 0x1c) geteuid() [ 1908.785907][T28269] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1908.793969][T28269] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1908.801959][T28269] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1908.809948][T28269] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:05 executing program 2 (fault-call:2 fault-nth:26): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1908.900410][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:45:05 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x4020940d, &(0x7f0000000000)=0x2) 14:45:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x4000000000000000]}}, 0x1c) geteuid() 14:45:05 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10000, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f00000000c0)=0x1f) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0xffffffff}, 0x2) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@timestamp], 0x1) dup3(r1, r2, 0x0) 14:45:05 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0086418, &(0x7f0000000100)={0x8, 0x7ff, 0x4, 0x5, 0x11, 0x3ff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f00000001c0)={@broadcast, @loopback, 0x0, 0x5, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0x1f}, @loopback, @broadcast]}, 0x24) socket$inet_smc(0x2b, 0x1, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x101200, 0x0) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f00000002c0)) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0xffffffffffffffff, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000240)='/dev/udmabuf\x00', 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000380)={0x0, 0x20}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000400)={r6, 0xff}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) socket$tipc(0x1e, 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x232, &(0x7f00000000c0)={0x7fe, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) 14:45:05 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x1) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000280)=0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x5, 0x30}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x5, 0x1000, 0x7fff, 0x5, 0x4}, 0x14) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000200)={0x15, 0x0, 0x4}) 14:45:05 executing program 4 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x4, 0x84800) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x4, 0x0) [ 1909.080085][T28906] FAULT_INJECTION: forcing a failure. [ 1909.080085][T28906] name failslab, interval 1, probability 0, space 0, times 0 [ 1909.111883][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1909.145603][T28906] CPU: 0 PID: 28906 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1909.153638][T28906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1909.163707][T28906] Call Trace: [ 1909.167023][T28906] dump_stack+0x172/0x1f0 [ 1909.171387][T28906] should_fail.cold+0xa/0x15 [ 1909.176008][T28906] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1909.181840][T28906] ? ___might_sleep+0x163/0x280 [ 1909.186707][T28906] __should_failslab+0x121/0x190 [ 1909.192427][T28906] should_failslab+0x9/0x14 [ 1909.192469][T28906] kmem_cache_alloc+0x2b2/0x6f0 [ 1909.192489][T28906] ? kasan_check_read+0x11/0x20 [ 1909.206680][T28906] __d_alloc+0x2e/0x8c0 [ 1909.210843][T28906] d_alloc+0x4d/0x2b0 [ 1909.214821][T28906] ? unwind_get_return_address+0x61/0xa0 [ 1909.220453][T28906] d_alloc_parallel+0xf4/0x1bc0 [ 1909.225302][T28906] ? __lock_acquire+0x548/0x3fb0 [ 1909.230246][T28906] ? __d_lookup_rcu+0x6c0/0x6c0 [ 1909.235087][T28906] ? find_held_lock+0x35/0x130 [ 1909.239839][T28906] ? __d_lookup+0x40c/0x760 [ 1909.244340][T28906] ? lockdep_init_map+0x1be/0x6d0 [ 1909.249357][T28906] ? lockdep_init_map+0x1be/0x6d0 [ 1909.254477][T28906] __lookup_slow+0x1ab/0x500 [ 1909.259059][T28906] ? vfs_unlink+0x560/0x560 [ 1909.263548][T28906] ? __d_lookup+0x433/0x760 [ 1909.268074][T28906] lookup_slow+0x58/0x80 [ 1909.272308][T28906] walk_component+0x74b/0x2000 [ 1909.277063][T28906] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1909.282427][T28906] ? kasan_check_read+0x11/0x20 [ 1909.287271][T28906] ? path_init+0x18f0/0x18f0 [ 1909.291854][T28906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.298173][T28906] ? security_inode_permission+0xd5/0x110 [ 1909.303884][T28906] ? inode_permission+0xb4/0x570 [ 1909.308816][T28906] link_path_walk.part.0+0x594/0x1340 [ 1909.314189][T28906] ? walk_component+0x2000/0x2000 [ 1909.319208][T28906] ? save_stack+0x45/0xd0 [ 1909.323531][T28906] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1909.329330][T28906] ? getname_kernel+0x40/0x370 [ 1909.334088][T28906] path_lookupat.isra.0+0xe3/0x8d0 [ 1909.339193][T28906] ? do_fast_syscall_32+0x281/0xc98 [ 1909.344399][T28906] ? path_parentat.isra.0+0x160/0x160 [ 1909.349761][T28906] ? save_stack+0xa9/0xd0 [ 1909.354095][T28906] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1909.359721][T28906] filename_lookup+0x1b0/0x410 [ 1909.364483][T28906] ? nd_jump_link+0x1d0/0x1d0 [ 1909.369165][T28906] ? simple_attr_release+0x50/0x50 [ 1909.374284][T28906] ? memcpy+0x46/0x50 [ 1909.378268][T28906] ? getname_kernel+0x223/0x370 [ 1909.383109][T28906] kern_path+0x36/0x40 [ 1909.387169][T28906] tomoyo_realpath_nofollow+0x74/0xdb [ 1909.392528][T28906] ? tomoyo_realpath_from_path+0x730/0x730 [ 1909.398324][T28906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1909.404552][T28906] ? tomoyo_init_request_info+0x105/0x1d0 [ 1909.410265][T28906] tomoyo_find_next_domain+0x28c/0x1f8a [ 1909.415803][T28906] ? mark_held_locks+0xf0/0xf0 [ 1909.420558][T28906] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1909.426795][T28906] ? tomoyo_dump_page+0x510/0x510 [ 1909.431810][T28906] ? lock_acquire+0x16f/0x3f0 [ 1909.436476][T28906] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1909.442284][T28906] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1909.447998][T28906] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1909.453799][T28906] security_bprm_check+0x69/0xb0 [ 1909.458728][T28906] search_binary_handler+0x77/0x570 [ 1909.464002][T28906] ? kasan_check_read+0x11/0x20 [ 1909.468852][T28906] __do_execve_file.isra.0+0x1394/0x23f0 [ 1909.474485][T28906] ? copy_strings_kernel+0x110/0x110 [ 1909.479760][T28906] ? strncpy_from_user+0x2a8/0x380 [ 1909.485041][T28906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.491538][T28906] __ia32_compat_sys_execveat+0xf3/0x140 [ 1909.497166][T28906] do_fast_syscall_32+0x281/0xc98 [ 1909.502191][T28906] entry_SYSENTER_compat+0x70/0x7f [ 1909.507289][T28906] RIP: 0023:0xf7f71869 [ 1909.511363][T28906] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1909.530972][T28906] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1909.539374][T28906] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 14:45:05 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x40) ioctl$UI_END_FF_UPLOAD(r2, 0x406055c9, &(0x7f0000000100)={0xe, 0x6, {0x57, 0x4, 0x1000, {0xfffffffffffffffb, 0x5b68}, {0x0, 0xffffffffffffffff}, @const={0x4, {0x9, 0x7, 0xee0000000000000, 0x4}}}, {0x56, 0x1, 0x7, {0x9, 0x5}, {0x9, 0xb9}, @rumble={0xfffffffeffffffff, 0x401}}}) [ 1909.547331][T28906] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1909.555292][T28906] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1909.563252][T28906] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1909.571212][T28906] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:05 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x40, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) personality(0x5000004) dup3(r0, r1, 0x0) 14:45:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x4002000000000000]}}, 0x1c) geteuid() 14:45:05 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x7) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000100)) openat$ion(0xffffffffffffff9c, 0x0, 0x8401, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:05 executing program 2 (fault-call:2 fault-nth:27): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:45:05 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) [ 1909.802885][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1909.838316][T29463] FAULT_INJECTION: forcing a failure. [ 1909.838316][T29463] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:45:06 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0x1, 0x3}, &(0x7f00000001c0)=0xc) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x24041, 0x0) [ 1909.851560][T29463] CPU: 1 PID: 29463 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1909.859547][T29463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1909.869617][T29463] Call Trace: [ 1909.872927][T29463] dump_stack+0x172/0x1f0 [ 1909.877273][T29463] should_fail.cold+0xa/0x15 [ 1909.881873][T29463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1909.896130][T29463] ? debug_smp_processor_id+0x3c/0x280 [ 1909.901606][T29463] ? perf_trace_lock+0xeb/0x510 [ 1909.906474][T29463] should_fail_alloc_page+0x50/0x60 [ 1909.906492][T29463] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1909.906516][T29463] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1909.917055][T29463] ? find_held_lock+0x35/0x130 [ 1909.917079][T29463] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1909.917099][T29463] cache_grow_begin+0x9c/0x860 [ 1909.917114][T29463] ? getname_kernel+0x53/0x370 [ 1909.917130][T29463] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1909.917149][T29463] kmem_cache_alloc+0x62d/0x6f0 [ 1909.917172][T29463] getname_kernel+0x53/0x370 [ 1909.917187][T29463] kern_path+0x20/0x40 [ 1909.917204][T29463] tomoyo_realpath_nofollow+0x74/0xdb [ 1909.917217][T29463] ? tomoyo_realpath_from_path+0x730/0x730 [ 1909.917231][T29463] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1909.917245][T29463] ? tomoyo_init_request_info+0x105/0x1d0 [ 1909.917265][T29463] tomoyo_find_next_domain+0x28c/0x1f8a [ 1909.917281][T29463] ? mark_held_locks+0xf0/0xf0 [ 1909.917308][T29463] ? tomoyo_dump_page+0x510/0x510 14:45:06 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) [ 1909.917323][T29463] ? lock_acquire+0x16f/0x3f0 [ 1909.917339][T29463] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1909.917361][T29463] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1909.917373][T29463] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1909.917393][T29463] security_bprm_check+0x69/0xb0 [ 1909.917412][T29463] search_binary_handler+0x77/0x570 [ 1909.917427][T29463] ? kasan_check_read+0x11/0x20 [ 1909.917449][T29463] __do_execve_file.isra.0+0x1394/0x23f0 [ 1909.917480][T29463] ? copy_strings_kernel+0x110/0x110 [ 1909.917497][T29463] ? strncpy_from_user+0x2a8/0x380 [ 1910.028433][T29463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.038455][T29463] __ia32_compat_sys_execveat+0xf3/0x140 [ 1910.038483][T29463] do_fast_syscall_32+0x281/0xc98 [ 1910.038503][T29463] entry_SYSENTER_compat+0x70/0x7f [ 1910.038514][T29463] RIP: 0023:0xf7f71869 [ 1910.038528][T29463] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 14:45:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x5400000000000000]}}, 0x1c) geteuid() [ 1910.038535][T29463] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1910.038549][T29463] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1910.038557][T29463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1910.038564][T29463] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1910.038571][T29463] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1910.038579][T29463] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:06 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x4, 0x84800) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x4, 0x0) 14:45:06 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x3, 0x204002) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0xaeef, 0x1, 0x0, r1}) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=""/32) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x8, 0x20, 0x0, r0}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) finit_module(r1, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x1) [ 1910.211931][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:45:06 executing program 2 (fault-call:2 fault-nth:28): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:45:06 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000080)=@generic={0x2, 0x401}) 14:45:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x607f020000000000]}}, 0x1c) geteuid() 14:45:06 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4008641a, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[0x3ff, 0x2, 0x10000, 0x7f]}) [ 1910.420154][T30067] FAULT_INJECTION: forcing a failure. [ 1910.420154][T30067] name failslab, interval 1, probability 0, space 0, times 0 [ 1910.450780][T30067] CPU: 1 PID: 30067 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1910.458822][T30067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1910.468904][T30067] Call Trace: [ 1910.472222][T30067] dump_stack+0x172/0x1f0 [ 1910.476581][T30067] should_fail.cold+0xa/0x15 [ 1910.477313][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1910.481192][T30067] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1910.481214][T30067] ? ___might_sleep+0x163/0x280 [ 1910.481234][T30067] __should_failslab+0x121/0x190 [ 1910.498229][T30067] should_failslab+0x9/0x14 [ 1910.498247][T30067] kmem_cache_alloc+0x2b2/0x6f0 [ 1910.498264][T30067] ? kasan_check_read+0x11/0x20 [ 1910.498282][T30067] __d_alloc+0x2e/0x8c0 [ 1910.498296][T30067] d_alloc+0x4d/0x2b0 [ 1910.498316][T30067] ? unwind_get_return_address+0x61/0xa0 [ 1910.498342][T30067] d_alloc_parallel+0xf4/0x1bc0 [ 1910.498361][T30067] ? __lock_acquire+0x548/0x3fb0 [ 1910.508938][T30067] ? __d_lookup_rcu+0x6c0/0x6c0 [ 1910.508952][T30067] ? find_held_lock+0x35/0x130 [ 1910.508964][T30067] ? __d_lookup+0x40c/0x760 [ 1910.508980][T30067] ? lockdep_init_map+0x1be/0x6d0 [ 1910.508994][T30067] ? lockdep_init_map+0x1be/0x6d0 14:45:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x648e456600000000]}}, 0x1c) geteuid() 14:45:06 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x440, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000000c0)={0x3ff, 0x0, 0xa746, {0x77359400}, 0x5, 0x200}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) [ 1910.509015][T30067] __lookup_slow+0x1ab/0x500 [ 1910.509032][T30067] ? vfs_unlink+0x560/0x560 [ 1910.580029][T30067] ? __d_lookup+0x433/0x760 [ 1910.584574][T30067] lookup_slow+0x58/0x80 [ 1910.588834][T30067] walk_component+0x74b/0x2000 [ 1910.593631][T30067] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1910.599020][T30067] ? kasan_check_read+0x11/0x20 [ 1910.603896][T30067] ? path_init+0x18f0/0x18f0 [ 1910.608505][T30067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.614777][T30067] ? security_inode_permission+0xd5/0x110 14:45:06 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x80000, 0x0) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f0000000140)) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xfff, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) [ 1910.620518][T30067] ? inode_permission+0xb4/0x570 [ 1910.625474][T30067] link_path_walk.part.0+0x594/0x1340 [ 1910.630875][T30067] ? walk_component+0x2000/0x2000 [ 1910.635914][T30067] ? save_stack+0x45/0xd0 [ 1910.640266][T30067] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1910.646092][T30067] ? getname_kernel+0x40/0x370 [ 1910.650890][T30067] path_lookupat.isra.0+0xe3/0x8d0 [ 1910.656026][T30067] ? do_fast_syscall_32+0x281/0xc98 14:45:06 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000140)="1f8740c789d864983476d3e2dda90671", 0x10) getsockname$inet6(r1, &(0x7f0000000580)={0xa, 0x0, 0x0, @local}, &(0x7f00000005c0)=0x1c) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000700)={0x7, 0x100, "a04e3904c4b32296c1a5bedd509a5050a2d90f5067633f5c964b28a5339c16dc", 0x5, 0x2, 0xffff, 0x7, 0x3}) r4 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000300)={0x0, @local}, &(0x7f0000000340)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'batadv0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x10c, r4, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}]}}, {{0x8, 0x1, r6}, {0xac, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1c}}}]}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x2) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x8002, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r7, 0x0, 0x484, &(0x7f0000000600)=""/140, &(0x7f00000006c0)=0x8c) syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x4, 0x80000) socket$can_bcm(0x1d, 0x2, 0x2) openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x400000, 0x0) [ 1910.659787][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1910.661238][T30067] ? path_parentat.isra.0+0x160/0x160 [ 1910.661259][T30067] ? cache_grow_end+0xa4/0x190 [ 1910.682383][T30067] ? find_held_lock+0x35/0x130 [ 1910.687168][T30067] ? cache_grow_end+0xa4/0x190 [ 1910.691948][T30067] filename_lookup+0x1b0/0x410 [ 1910.696727][T30067] ? nd_jump_link+0x1d0/0x1d0 [ 1910.701442][T30067] ? simple_attr_release+0x50/0x50 [ 1910.706573][T30067] ? memcpy+0x46/0x50 [ 1910.706588][T30067] ? getname_kernel+0x223/0x370 [ 1910.706602][T30067] kern_path+0x36/0x40 14:45:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x838d0e0600000000]}}, 0x1c) geteuid() [ 1910.706618][T30067] tomoyo_realpath_nofollow+0x74/0xdb [ 1910.706632][T30067] ? tomoyo_realpath_from_path+0x730/0x730 [ 1910.706648][T30067] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1910.706660][T30067] ? tomoyo_init_request_info+0x105/0x1d0 [ 1910.706680][T30067] tomoyo_find_next_domain+0x28c/0x1f8a [ 1910.706700][T30067] ? mark_held_locks+0xf0/0xf0 [ 1910.715506][T30067] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1910.715530][T30067] ? tomoyo_dump_page+0x510/0x510 [ 1910.715545][T30067] ? lock_acquire+0x16f/0x3f0 [ 1910.715559][T30067] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1910.715580][T30067] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1910.715592][T30067] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1910.715611][T30067] security_bprm_check+0x69/0xb0 [ 1910.715629][T30067] search_binary_handler+0x77/0x570 [ 1910.715645][T30067] ? kasan_check_read+0x11/0x20 [ 1910.715666][T30067] __do_execve_file.isra.0+0x1394/0x23f0 [ 1910.796443][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1910.796780][T30067] ? copy_strings_kernel+0x110/0x110 [ 1910.823512][T30067] ? strncpy_from_user+0x2a8/0x380 [ 1910.828644][T30067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.834909][T30067] __ia32_compat_sys_execveat+0xf3/0x140 [ 1910.840566][T30067] do_fast_syscall_32+0x281/0xc98 [ 1910.845637][T30067] entry_SYSENTER_compat+0x70/0x7f [ 1910.845649][T30067] RIP: 0023:0xf7f71869 [ 1910.845662][T30067] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1910.845669][T30067] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1910.845682][T30067] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1910.845689][T30067] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1910.845695][T30067] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1910.845702][T30067] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 14:45:07 executing program 3: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x3) 14:45:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x4, 0x84800) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x2000, 0x0) 14:45:07 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x5, 0x80000) flistxattr(r0, &(0x7f00000000c0)=""/75, 0x4b) socket(0x1f, 0x80000, 0x1ff) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0xfff, @local, 0x1800000000000}}, 0xfffffffffffffffb, 0x3, 0x8001, 0x1, 0x430}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000280)={r3, 0x400}, 0x8) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000340)=0x7) linkat(r0, &(0x7f00000002c0)='./file0\x00', r0, &(0x7f0000000300)='./file0\x00', 0x1000) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) 14:45:07 executing program 2 (fault-call:2 fault-nth:29): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 1910.845709][T30067] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:07 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x100000810000, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080)=0x81, 0x4) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x23, 0x800000, 0xffffffffffffff9c}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x210080, 0x0) r3 = dup3(r0, r2, 0x0) write$selinux_attr(r3, &(0x7f0000000000)='system_u:object_r:hald_cache_t:s0\x00', 0x22) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xc, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x8}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xb58}, @map={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x49}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1ff}, @jmp={0x5, 0x4, 0x0, 0xa, 0xf, 0xfffffffffffffffe, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000140)='syzkaller\x00', 0x8000, 0xc2, &(0x7f00000001c0)=""/194, 0x41000, 0x1, [], r4, 0x0, r1, 0x8, &(0x7f0000000300)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x6, 0x7, 0x3, 0x81}, 0x10}, 0x70) 14:45:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x8dffffff00000000]}}, 0x1c) geteuid() 14:45:07 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000100)={'veth1\x00', &(0x7f0000000080)=@ethtool_ringparam={0x11, 0x4, 0x12, 0x4, 0x4, 0x101, 0xfffffffffffffffa, 0x1, 0x7fffffff}}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) [ 1911.000382][T30499] FAULT_INJECTION: forcing a failure. [ 1911.000382][T30499] name failslab, interval 1, probability 0, space 0, times 0 14:45:07 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x20100, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000140)={0x1000, 0x3ff, 0x0, 0xb4, [], [], [], 0x9, 0xffffffffffffffff, 0xfffffffffffff615, 0x80000000, "1ccc49492ead37d1b813d0155df2badf"}) r1 = socket$inet6(0xa, 0xa, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x10001, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x1) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) r4 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="5361fa519a1b1a56e33ec9d87e570a57f0810b6c20627ddfb80fc25ba4d30efc10f844be97224e0b308ee4f160564eeade27a3eec85f7948dc2ee57d009c0b8bd649568a140e738bc21f3641ab29b766b7959140ef27f4d331fd6f80f5f90da9b6a58aabdf8d85c40d2b037fad0ab5e03e202f1f5902e435b89cf814b0c3bd8e2eb98882f15f14ab041d44aaba9ccdc446fd2777277f4dc591448db83a84d5e462cbdaaa99e37f", 0xfffffffffffffefc, r4) ioctl$KVM_GET_CPUID2(r3, 0xc008ae91, &(0x7f0000000280)={0x4, 0x0, [{}, {}, {}, {}]}) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) [ 1911.126099][T30499] CPU: 0 PID: 30499 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1911.134139][T30499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1911.144210][T30499] Call Trace: [ 1911.147620][T30499] dump_stack+0x172/0x1f0 [ 1911.151972][T30499] should_fail.cold+0xa/0x15 [ 1911.156585][T30499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1911.162415][T30499] ? ___might_sleep+0x163/0x280 [ 1911.167287][T30499] __should_failslab+0x121/0x190 [ 1911.172236][T30499] ? proc_i_callback+0x30/0x30 [ 1911.177008][T30499] should_failslab+0x9/0x14 [ 1911.181524][T30499] kmem_cache_alloc+0x2b2/0x6f0 [ 1911.186380][T30499] ? get_pid_task+0xc9/0x190 [ 1911.190978][T30499] ? find_held_lock+0x35/0x130 [ 1911.195749][T30499] ? proc_i_callback+0x30/0x30 [ 1911.200525][T30499] proc_alloc_inode+0x1c/0x1a0 [ 1911.205295][T30499] alloc_inode+0x66/0x190 [ 1911.205311][T30499] new_inode_pseudo+0x19/0xf0 [ 1911.205326][T30499] new_inode+0x1f/0x40 [ 1911.205347][T30499] proc_pid_make_inode+0x22/0x230 [ 1911.218567][T30499] proc_pident_instantiate+0x82/0x2a0 [ 1911.218587][T30499] proc_pident_lookup+0x1ad/0x210 [ 1911.218610][T30499] proc_tgid_base_lookup+0x2c/0x40 [ 1911.218628][T30499] __lookup_slow+0x27e/0x500 [ 1911.243709][T30499] ? vfs_unlink+0x560/0x560 [ 1911.248225][T30499] ? __d_lookup+0x433/0x760 [ 1911.252871][T30499] lookup_slow+0x58/0x80 [ 1911.257130][T30499] walk_component+0x74b/0x2000 [ 1911.262002][T30499] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1911.267386][T30499] ? kasan_check_read+0x11/0x20 [ 1911.267408][T30499] ? path_init+0x18f0/0x18f0 [ 1911.276845][T30499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.283105][T30499] ? security_inode_permission+0xd5/0x110 [ 1911.288837][T30499] ? inode_permission+0xb4/0x570 [ 1911.288862][T30499] link_path_walk.part.0+0x594/0x1340 [ 1911.288885][T30499] ? walk_component+0x2000/0x2000 [ 1911.288903][T30499] ? save_stack+0x45/0xd0 [ 1911.288922][T30499] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1911.314356][T30499] ? getname_kernel+0x40/0x370 [ 1911.319149][T30499] path_lookupat.isra.0+0xe3/0x8d0 [ 1911.324285][T30499] ? do_fast_syscall_32+0x281/0xc98 [ 1911.329506][T30499] ? path_parentat.isra.0+0x160/0x160 [ 1911.334910][T30499] ? cache_grow_end+0xa4/0x190 [ 1911.339688][T30499] ? find_held_lock+0x35/0x130 [ 1911.344475][T30499] ? cache_grow_end+0xa4/0x190 [ 1911.349262][T30499] filename_lookup+0x1b0/0x410 [ 1911.354047][T30499] ? nd_jump_link+0x1d0/0x1d0 [ 1911.358758][T30499] ? simple_attr_release+0x50/0x50 [ 1911.363911][T30499] ? memcpy+0x46/0x50 [ 1911.367910][T30499] ? getname_kernel+0x223/0x370 [ 1911.372779][T30499] kern_path+0x36/0x40 [ 1911.376880][T30499] tomoyo_realpath_nofollow+0x74/0xdb [ 1911.382268][T30499] ? tomoyo_realpath_from_path+0x730/0x730 [ 1911.388097][T30499] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1911.394360][T30499] ? tomoyo_init_request_info+0x105/0x1d0 [ 1911.400091][T30499] tomoyo_find_next_domain+0x28c/0x1f8a [ 1911.400109][T30499] ? mark_held_locks+0xf0/0xf0 [ 1911.400129][T30499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1911.410431][T30499] ? tomoyo_dump_page+0x510/0x510 [ 1911.410451][T30499] ? lock_acquire+0x16f/0x3f0 [ 1911.410470][T30499] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1911.432204][T30499] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1911.438129][T30499] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1911.443961][T30499] security_bprm_check+0x69/0xb0 [ 1911.448923][T30499] search_binary_handler+0x77/0x570 [ 1911.454154][T30499] ? kasan_check_read+0x11/0x20 [ 1911.459037][T30499] __do_execve_file.isra.0+0x1394/0x23f0 [ 1911.464703][T30499] ? copy_strings_kernel+0x110/0x110 [ 1911.470005][T30499] ? strncpy_from_user+0x2a8/0x380 14:45:07 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x6, 0x1ff, 0x9, 0x5, 0x22, "858c1b8227e7a767fd6dc46336d6c531239576", 0xfffffffffffffb70}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r2, 0x4) 14:45:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x91ffffff00000000]}}, 0x1c) geteuid() 14:45:07 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xa6a0, 0x200000) sendmsg$tipc(r0, &(0x7f0000001700)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x3, {{0x40, 0x2}, 0x3}}, 0x10, &(0x7f0000001640)=[{&(0x7f00000001c0)="c77e1220e76b478a5c7486939fe12f0de21804742bf9b83d18efed852d0b2d4a887d85a40121f41ce4a66303f1dcfdfc2863a9f49d4855a63f16247cb22bb918b3464442dd700478b20c37e368873d2aa16f49", 0x53}, {&(0x7f0000000240)="9e3fb2da7ef82284243535376adc27f7c304339c66dac7d4902117c05c5236b9f81a4888be5cf81921b0292cb7512dc811c71bd6895e596cb993e54fa640d764218d497ad5ebfa81d85eacf83f29cb2d792e0102ecdf6baf8e0f6fa49171f82f2773237f506a05b9684b6fefb01f5694cef35b02442f491f99d9b874fff8cc10a1c152f564f91bf19678a5460f3fe4b0df3c14", 0x93}, {&(0x7f0000000300)="2e731bc71217aed0e7b17bf314906a8d2529f1a1b5ee8096b4da57eba6c710e180eedb7572e290e81b6e1c64b30fcddccfbae1888ffafb8b13c43967332b7c97da1302800a699a66a10c31cc99e84ffee676a337f436de4fcfa47118e7c88106e65152b0c80670a00b03e11c3ec4ced4ebb7ce1d0afc78768717a567d7fcd1b361f242f2f014876d7389c73ab9057cc9374edd4c8cc81737", 0x98}, {&(0x7f00000003c0)="af19af40ee227b7d8584535f60d892b4ff684d869597e06d9ba1a88b61b2231b8e734b523f47d40c9cce0d1798dbca3a9fbaf18022bd63e6c9ac926e04fd3963902e7aa453c3eca1a843dad2faea958045863c4fd2aadbb5ce2fdc92c76ebf", 0x5f}, {&(0x7f0000000440)="1b3f8ba87cb2ca4dc61081446fac1657ba323eb51050366d6cc954d13680119eb45fe9a7c3a7e379752514028638239b34278c4cb6d18edeb007b49935430091ea2de5996ecde85a20b255a1aeeb743898491754dc3d23bcd9564985e598cc487128cc655e80bff5e5da4311b1a6b4e190569732f5a5192eda26570c528d3e91c5586eb51bc5b0350f70a46f4054bd56c581febf8f3cca7075b9898e68a5ace01d086ea5344a05af35bcb57f23b89fc53e2bf319dc9331ccc9963dd0dd0a660b9f30ee1cd50a0f0aebdfdff5", 0xcc}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="cbd42ecebe67e6c3de1a37b1ab2b3d6691", 0x11}, {&(0x7f0000001580)="d642ca73c2e4efcb9459e3098bc45d7aa5b0cb4486f5f6cba0b7ab8e23a50ca585d1f6839adaf9560df0ea453f1b14ac72414c1cefbf0e5be75440beb88b700a57a732356e6a25ffd2117f85d5e202662f55cdff86fbbdf9844638772045ab587f0a5b47c32dea8bf5d50173dec43445ce2599a5445be4020391473a2f1e43818e8bdee3238e6bbe53941a", 0x8b}], 0x8, &(0x7f0000001680)="e3aed21565c2bf0991f4aa90fb0e5d8d49ba035dc6d1ed78ec2797e9ec35560c2463149ad4cc93d79391fd89f1d478214b86a5716a9fad26ad7bf3e942ded274a784ae90eb1f1305d216", 0x4a, 0x4000000}, 0x80) r1 = openat(0xffffffffffffffff, &(0x7f0000001740)='./file0\x00', 0x40000, 0x3) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000080)) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f00000000c0)=0x3) socket$rds(0x15, 0x5, 0x0) 14:45:07 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0xc0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000080)) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) 14:45:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xb8ff000000000000]}}, 0x1c) geteuid() [ 1911.475141][T30499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.481400][T30499] __ia32_compat_sys_execveat+0xf3/0x140 [ 1911.481425][T30499] do_fast_syscall_32+0x281/0xc98 [ 1911.481451][T30499] entry_SYSENTER_compat+0x70/0x7f [ 1911.497193][T30499] RIP: 0023:0xf7f71869 [ 1911.501275][T30499] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1911.525959][T30499] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1911.525975][T30499] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1911.525983][T30499] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1911.525992][T30499] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1911.526001][T30499] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1911.526009][T30499] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x4, 0x84800) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x20000048, 0x0) 14:45:07 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x400, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x7, 0x5, 0x5}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000300)={0x10, 0x32, 0x11, 0x1e, 0x0, 0x2, 0x5, 0x68, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000240)={0x0, @bt={0x2, 0x7ff, 0x0, 0x2, 0x9, 0xfff, 0x44a5, 0x40, 0x5e0, 0x8, 0x100000000, 0x1, 0x8, 0x3, 0x8, 0x3}}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000000c0)=0x3) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000180)) 14:45:07 executing program 2 (fault-call:2 fault-nth:30): r0 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 14:45:07 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000080)) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) dup3(r0, r2, 0x0) 14:45:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xc236b47f8f010000]}}, 0x1c) geteuid() 14:45:07 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 14:45:07 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x3) [ 1911.827954][T31581] FAULT_INJECTION: forcing a failure. [ 1911.827954][T31581] name failslab, interval 1, probability 0, space 0, times 0 14:45:08 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2080) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x2) r3 = dup3(r1, r2, 0x80000) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x1}) [ 1911.915052][T31581] CPU: 1 PID: 31581 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1911.923079][T31581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1911.933152][T31581] Call Trace: [ 1911.936468][T31581] dump_stack+0x172/0x1f0 [ 1911.940832][T31581] should_fail.cold+0xa/0x15 [ 1911.945451][T31581] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1911.951287][T31581] ? ___might_sleep+0x163/0x280 [ 1911.956165][T31581] __should_failslab+0x121/0x190 [ 1911.961125][T31581] should_failslab+0x9/0x14 [ 1911.965648][T31581] __kmalloc+0x2dc/0x740 [ 1911.969914][T31581] ? tomoyo_realpath_from_path+0xba/0x730 [ 1911.975657][T31581] ? rcu_read_lock_sched_held+0x110/0x130 [ 1911.981395][T31581] ? tomoyo_realpath_from_path+0xc7/0x730 [ 1911.987140][T31581] tomoyo_realpath_from_path+0xc7/0x730 [ 1911.992722][T31581] tomoyo_realpath_nofollow+0xc8/0xdb [ 1911.998128][T31581] ? tomoyo_realpath_from_path+0x730/0x730 [ 1912.003969][T31581] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1912.010246][T31581] ? tomoyo_init_request_info+0x105/0x1d0 [ 1912.015986][T31581] tomoyo_find_next_domain+0x28c/0x1f8a [ 1912.016003][T31581] ? mark_held_locks+0xf0/0xf0 [ 1912.016025][T31581] ? tomoyo_dump_page+0x510/0x510 [ 1912.016040][T31581] ? lock_acquire+0x16f/0x3f0 [ 1912.016052][T31581] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1912.016075][T31581] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1912.016089][T31581] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1912.016107][T31581] security_bprm_check+0x69/0xb0 [ 1912.016127][T31581] search_binary_handler+0x77/0x570 14:45:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xc4ffffff00000000]}}, 0x1c) geteuid() 14:45:08 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) flock(r0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = dup3(r0, r1, 0x0) getsockname$inet(r2, &(0x7f0000000000), &(0x7f0000000080)=0x10) [ 1912.058354][T31581] ? kasan_check_read+0x11/0x20 [ 1912.058380][T31581] __do_execve_file.isra.0+0x1394/0x23f0 [ 1912.058413][T31581] ? copy_strings_kernel+0x110/0x110 [ 1912.079782][T31581] ? strncpy_from_user+0x2a8/0x380 [ 1912.084927][T31581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.091193][T31581] __ia32_compat_sys_execveat+0xf3/0x140 [ 1912.096852][T31581] do_fast_syscall_32+0x281/0xc98 [ 1912.101902][T31581] entry_SYSENTER_compat+0x70/0x7f [ 1912.107028][T31581] RIP: 0023:0xf7f71869 [ 1912.111140][T31581] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1912.130766][T31581] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1912.139192][T31581] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1912.147184][T31581] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1912.155173][T31581] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 14:45:08 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0xaeef, 0x32, 0x0, 0xffffffffffffff9c}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4800, 0x0) getresuid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)=0x0) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) write$P9_RSTATu(r2, &(0x7f0000000300)={0x64, 0x7d, 0x1, {{0x0, 0x4f, 0x401, 0xffff, {0x0, 0x2, 0x7}, 0x80000, 0x0, 0x40, 0x6, 0x9, '/dev/ion\x00', 0x9, '/dev/ion\x00', 0x1, '#', 0x9, '/dev/ion\x00'}, 0x0, '', r3, r4, r5}}, 0x64) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000380), 0x2) [ 1912.163164][T31581] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1912.171157][T31581] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 14:45:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0xdc7f000000000000]}}, 0x1c) geteuid() [ 1912.243027][T31581] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1912.263533][T31581] Kernel panic - not syncing: MAC Initialization failed. [ 1912.270620][T31581] CPU: 0 PID: 31581 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #92 [ 1912.278603][T31581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1912.288668][T31581] Call Trace: [ 1912.291983][T31581] dump_stack+0x172/0x1f0 [ 1912.296335][T31581] panic+0x2cb/0x65c [ 1912.300248][T31581] ? __warn_printk+0xf3/0xf3 [ 1912.304857][T31581] ? tomoyo_realpath_from_path+0x394/0x730 [ 1912.310678][T31581] ? tomoyo_warn_oom.cold+0x24/0x43 [ 1912.313522][ T3876] kobject: 'loop3' (000000004334c68e): kobject_uevent_env [ 1912.315898][T31581] tomoyo_warn_oom.cold+0x35/0x43 [ 1912.315914][T31581] tomoyo_realpath_from_path+0x3a8/0x730 [ 1912.315939][T31581] tomoyo_realpath_nofollow+0xc8/0xdb [ 1912.323055][ T3876] kobject: 'loop3' (000000004334c68e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1912.328046][T31581] ? tomoyo_realpath_from_path+0x730/0x730 [ 1912.328063][T31581] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1912.328077][T31581] ? tomoyo_init_request_info+0x105/0x1d0 [ 1912.328101][T31581] tomoyo_find_next_domain+0x28c/0x1f8a [ 1912.372618][T31581] ? mark_held_locks+0xf0/0xf0 [ 1912.377417][T31581] ? tomoyo_dump_page+0x510/0x510 [ 1912.382447][T31581] ? lock_acquire+0x16f/0x3f0 [ 1912.387236][T31581] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1912.393034][T31581] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1912.398745][T31581] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1912.404646][T31581] security_bprm_check+0x69/0xb0 [ 1912.409572][T31581] search_binary_handler+0x77/0x570 [ 1912.414765][T31581] ? kasan_check_read+0x11/0x20 [ 1912.419602][T31581] __do_execve_file.isra.0+0x1394/0x23f0 [ 1912.425222][T31581] ? copy_strings_kernel+0x110/0x110 [ 1912.430488][T31581] ? strncpy_from_user+0x2a8/0x380 [ 1912.435586][T31581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.441836][T31581] __ia32_compat_sys_execveat+0xf3/0x140 [ 1912.447480][T31581] do_fast_syscall_32+0x281/0xc98 [ 1912.452497][T31581] entry_SYSENTER_compat+0x70/0x7f [ 1912.457601][T31581] RIP: 0023:0xf7f71869 [ 1912.461833][T31581] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1912.481420][T31581] RSP: 002b:00000000f5d6d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 1912.489824][T31581] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000000 [ 1912.497789][T31581] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 1912.505771][T31581] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1912.513817][T31581] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1912.521777][T31581] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1912.531399][T31581] Kernel Offset: disabled [ 1912.535878][T31581] Rebooting in 86400 seconds..