8ec35f60c4317ecae1596af1a5220d6cd9a170854014cb802d4e1ff2f77cf399c11ee2cb325baa4268d9aed30991ba5357fcde4e911da61db899aadd812d1bc247449d64e9d3aa8c2433749cd2af3cf78619bf02232bd7df4a39f6e5524fa947f4370b2ea5b9ef14afdf0390ec6df8b4fa1bd1a626ce0c82dcac8d80859fddcd34621a61f167766ecb7c88586172c534892a8cc32f8c485b0879883ea40afabc7727656dc8eb56ad8d37a3dcec1603eec68bb2515dc0735ef2fdfeb38a167b8f9c97c9215559b03754e2196e91e7c7aa25e768fdd30c2d262d78284c6db4a82de2278607df1d7b492a012bd42e5ce2427ab3a8"}, {&(0x7f0000004a40)="0cc63bb56942e7e68fb09138dcf6e2d51e5feeb04d5ee64633e2300cd3a034a34f7af69a5f798310661d46fd6338623bec81f5d5afcd8e73392645b6079e8d1b06494bd186c18a41e95d8061d93b4fec7a4c2ce486"}], 0x0, &(0x7f0000004b40)=[{0x0, 0x102, 0x5, "dbf69f5dc5241c66509f1eff6ab90291eacee3e5f8d008e531e8216a78ada608a5fb28e923d9470361e1978f2de23d1b30b4cd118435b9465d589186ac0927582bbf78cbfc4a41fb292ec63e0a14945637e2764a42b62924ff4ccd4c70a99bbd93d34954be565a6645a5fc7a322af9c98aefc2c97b0a91c9b7e9f6ceb9bacfe9db353e295254611454e6b745ceafce893ef40f69bc57852e6796d63c5f20cd24ac6605"}, {0x0, 0x117, 0x0, "6a88e410ed0728f51c19ed6b9b4987a0c1780b73c71e5734f5d46c0621a747a11f72bbf818b856a3aaf29f15a707115c0afd649b20f14f2bf192f1deaacd13d6dfa8906775a618f9e220a215d67c2793b425bfdd8d78429bb233dc2c8bd91f6bde8e39fd46e84580d291f508c1255e1436392fe00ac1db61ec6ac90314b354c522ef0ee154ce327bde2d9e003f2f29acd400f5b4da91"}, {0x0, 0x119, 0x5, "57954b8ca05c4a7b3841c815e931e96ae2f4df902dc7c99aecfe1d5c0a7b73065fbe4b9c976336c1b60b5582164b22483eacd575176f486858d7c52cd14ae83630299b65638d9f9b1888ea3ee0a9e7d2160ad703c732b473b614"}, {0x0, 0x29, 0x0, "f21a8df5c004ba3fcc050ac87ae20ea1913e70abb58434bc9ee051f8ccee8d36af3ffc9ffa536e1e7a54cf46a0342164250a4bd7d4c79baee62ed7542866c7f51fab0e"}, {0x0, 0x110, 0xfa, "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"}]}}, {{&(0x7f0000005d80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x0, {0xa, 0x4e20, 0xffffffc1, @mcast1, 0x5}}, 0x0, &(0x7f00000072c0)=[{&(0x7f0000005e00)="ce1a67e40586739d47343c179cb8d2853733eaee6b69666d3e7242916c18d55cfc9804207be7e8024f8ff64f1c4f550f48db346ba3c6aac82f84d01c6a0a7ef5fc2c00c88af5b7f3ed0658a25ce60046bb29b156b3e14ecd4e74e3b94179629da0e48a718066d26aedc1b276eddca261144e5f135a3ff3e598d77c96fd019e1c83bd2f0c4bc08fbc12036cdccff27923200b6643dcca6e4d31aedf2349b0d02b0d28f742ebcc3681effb23e9543a75cb0309a94b6573328943b229e99634da642285c424e24ce33b00e3e1ea"}, {&(0x7f0000005f00)="74beb555b937e306d48918ad2b355e627a54f982353be579a015ccdd75af9107e81920f316e2f86e66a5d60b772de96841f136d293421ce192deaff85660bc8600370dd67aa0958d52a85e8a3ca06d5a6b6fd39bfebbe583de37279c7b3d1fd5ef9e29cca1e9bf31870cbf85a5335ddbe4ca6db1bed46cc59c214e5db4809c4fc054a7bb9c7822b1bf394fd64231e5f93fdf6b4e40978a5335011aef814bd141838960f047dcce5081e2c43b95d49cd35bd718899d5768376656af9c94419dca7e8d8e61a0507063cb7054bef1b224419117213ad36d5eaeab7534008f889ce1331a3242e1c39e678ef45629cf1e1f44973aab680a676ee94dee80c253b421feef8d154cd91b422a0a1acf3ece5fe43bf7198232badbaee4453701850765bf5a0479e8f051809e1e0b3fba982bc0e61a99787d69effc4796b0d2d79b6cd42126687ea1f48720a6e1fd9d0f23e4776342d48a31b82a6d926a72cfa60ecaa6a306a0f67440388b9b1dff7fc1d7c5d65fa2967a578a37c5d92c158321966854b05551aebf22690769eb7e63d59bd996ee681ddbbb8bc022ebc0f9f4756773fa036b3172ca59baaafdf892a844ac5c9a212e3e1b8e806b2ec5d1a010d81457e52aac1c360b842d64023066eb27cb069ec093c7ab8d56ec96086350d2c8f61bd7b26afdbbc977edb4bc2cfd2059ee4208eb398218a5a3c2479608544fa6cc17acc08159e69abec24a5b5482246b17bf55523d82adbd229899abff3d0d87ab0ec1d9075c027fc50f844afc16f41625ceb735ea682c702adc1eb61f0d0763a4ec6635b11ea321c8ce632ed1d963fbc131a0af8648ed43c5d7d403e2e1e07ff93fd85fd80089e0ebef0d7467f48b7dd14329091d5b9979aa7b1d043b33cb5d378656dd48bbb76d6e6c2f3340d2eb8f98c351bdf1468781536485e9fbca2e5b2bfc951ceea02ab1362b56af3d68577eb108e0556eda040ec8149f2edb2fb944c0e97b6f10cd67e82f692a5f4cdd60957d47b4c00e7689e8ca589a2a9f52b548dc4ca3ed80e76e6629ce0e48c89ca0a80b2701d0f249680a0a0e7808f12e1810db3a144a6fc3e208ec80919817ea198a3ca1b4801b58717037162a82c2ab31c1ff585d20d0ca100f5e7208fd776f91cc785d32026a1f7d3c53336e33f6714af4a5ae6a9968059a6f51ee7a854513643032c20cabcdebc90b2c303d4c7cbf5a254f75529f9e145e3a1de119ff0dfdb01f4e59231457f183bc9ac79ef1ba9ef510843602830d97448acb2a193c0f7aee6488f86c7177c039205c6ab4c6e412aa87fb6de4782570e77c08730b67e699d95140a35fd8f179d2e3dba4bec0220d0e664958abe7f5654e444653b0bd2d5bf1910996491d068b25f21ff5435775d0fff6fed2f80a11bd35ac52d2c285a802285022733a0c0b5ba3fa274cbace41bc12081b052b6c016513c2c4b50c709a9a72c46c755b43888a5163741b45633927c32de221cc609c5263f59e9c185be9add3fdc79e18f0e77c5867fbf47b6b4e493888e74f109d0026e9f42a08ef9a3016cb3937ae99a41b80aa3e32998483da94b93148df828d04b48687ce778c92cea12b71e5a4c78f224cd180d2b68d183c1b845c2d0f322a70597049cc1f129a08aeb51bdf3c6cedeb3a076e66e9e0394a16de9250ef2d1d8f1ae202efbf9985a0470e6cb89c1d6bc113b3ad53dd76ed49c618d390180237d97a59bdd2e81925b4ad8be0a97261c9438fdef9c06458ecf0f9b82817607491d9bdf8935f4f29832a615f98b9508fea50993e8811d8bbbd50d75e544db89029ac360dd9257dfbf837993bc410fc5b9a470673dcd764e3e7a054de33ade7e46c10f07381cc9e7a924099bd417597e2dad7263a2e4e38c6b7ad9ef5b04a6a8b99d756e282360a3c4308eef143b0e82002e66930f303a311e1c94826a6734bf80868fe8997bfc4329b6ef41ff6d3fd5f9ee57624be9ef8f94e3e00622aca42c4985a335b2ff3dab40488cde7fcb960129d4aed96c37c3a52080c53a35bc94ad5d4f386aa595de06f254cae4711555c9afb0958260f332d0c1545fa6c5de10a3cbc7f1f4dd08e6ddc84eaf9e6662cb42d5a295c37f48570dad4c4aabe1017acf56f608719aa23d9a06867de5d412083d1eb5212de55fe14150d95d5e85b059ec8b55a381647fc1c3fa15729299ef7ac9081a27e19e97ee33e1e0546ff841cbbe350ff954bba2f8821104391e5e8c9f604eaf836e293760ff6ef63408fbb146da1f4980cd28c0010be6ebad5ef1723847697f57a500acff0d97eff1af60d49db552267fa2bf5a81014ac7b3b0c931bce8e8193ba61fdb204276bc3312102189f5efcf0496cc25ab654e2fb11fd2ac8e332ab14b39a56236e46024ec156cf4bcafd12c333e2c1cc6cd5831fd78cdb0a63eef1559dc4dcf2e2644aba06df90f0d8ea9eaf90e0f487bfbfdab7706c5101a99a5e0850a01f871b86189f6e5513765fdf9db499a60314980be28279c69d4c849ae1aa68f67f930412ea7e4571ae304ea160063515cd159799b554a341a0f722098ac80ee56a24720988686ffcbab6fae469fbfc3becd29808f3cb9127a9f67e8427e0de8e0b1e8874120afbbafd493e88dda7f0ca42e29f932150c2d8490ba457f28ed695e365bcce0e46182a3ccfb3ae23cd02547687cbe810173ade0709a4759c28dbd603598cf7b4005a6fba7aff3b9f71073b2e9c2c97680480729799fa7a35222b78bafa206e0181f1c14795547c0902f736d06160b24ef13f0506b76bcde47bf427e664dd4d9ecc467dff26036c57efdf3483a0247dd23edafcb28d5076cf15d44e7eed810dfdda199b3694c542f591637f94fa3b200ee6876b0f7488fd298b4a5d233e67a0173526d58fe722598d6754c15460032a5f99c656c70bcb4aabb92c4548fb21addfb0c10023ab34de88aa16de74d700f7f4824fd6296ee3540dc633f1c15cad6ccd9e8aa23f56ebeee5aefa88b2e5bff0dbf1673dda811a29daf08646c856f8ac28f6391ddde7d459b22aa41e91ffa45e25376fb621e9603450a1e7ecd25ac6e9ee5616befbc2edf575327395068b7b9c3a46e64338b17eea33d6549ab23d921cfba8943c87043aef1242f4b778cbb88f29d77009e5cc0ceb7184520205c13adeb169e84d4ee20d8d35dfa7e9cff67989c9dad9d999ceb584ff1151dce688c890410360dc1452eb4c67198196a8354163090fd8436319c67157a82cbaa303403d6ecf3c56b6da719bc15d6e0c298f14eac0efc201e0f2d614ae2b2c31b436c44ee466795646a0f56af93b9921cc07bbfb64501c1302cd4592e7d84a3566905d199763d8634c894d8108a76d360559688fef476428eec3f0cd984da5791cb6f8aa6e2063156d29237b301006545c60f0ae01cc38d91500f05e22c0100f4204092dc79534296d1bceca304dddd3be6a63b9b4807dc0b47a4714d654c17eb48eff8da73600e48c77395c9124a0967c51d1b36dbd80dd482b5c2d7de9d8d81d359ac7d54101add9987a2fb973d8c98ad0a94af5ec48ef56f358a9b511b6ab435bee2e8a23499453980955f5064c7f7813203095c176f8750fcc216f92913c91c9a343e5fbd11fd9b795d0744fdffc1b03b58f2eaed4430e22a75617b584547106ddb3b7066dc128e35f2e038d5fb0d2d8b3978dbe622ce49617c57fce89180e4d15b8d67deb53a7c80f3a244a58df2fa1b06c001ecee8d7d586770c530590746cfa80c5151cf410111c7e35ed0ef9da20e0574335762a203973ce355d554e4f7d0ecf5ec3cd5c8449df7809389e85e743fcfeb0166c5e975170dc91633e9e306bd730573f22bc16a0682cc3d0dd7363737fda7f0e73db65a6a1144d176b69ed75fefaaaa6db5ec41c840e5821076ad8c193c0fe45f823963acdcbd0a160aa2350b998a10caa44b143e8cddc29a7bd36bef8297470668245d2823d2b4aa1febd0b301bd929fefdfcb0fede63644a0a084a59cc1a5505b6ece5a30754c651e5bd56e267f816fb23251bafdd35bf9e544bea90a68d90e0068fde675e3f556a46389a69f49bed9b777ed0e37ede0164324d4fb11fc8aec14e6d6e3a66e35005fbe26fdf1f3c3d7585c2497147d47b5f2f208857ba6f8717fde6e625caa9611ec22f9f6ec5bdbc8bbdca16a36d09ce7e21560a79721f7bd6d029cadcc651536e0415455d93618879b8e7e5d37884fe9a43f898fbc677bc671180076e00796849fa2a5b1eeefae224e1048822d124536bc7cadd2300c6e280f15fb47ba7ce6931496ee1ef5a56336f663e6404fe18ad741e15860a6e181fcc5fbef858be229da85b4c364c9f607555f3f97f2f1462cce01d508ebf9ed95a07462859dd7bc73b3c673fa2112e0e1c02de4f67145d7b2c8fdbb567a0d753410551167dc565eeec6ae1b03a181ac9d724339e99335d658cd5e35a59cbfeb611e511874af152106f3df5fcf192961a99ce9a06023eaeb5c34d21ff98ff0ecd118083a76a9f88fc59cfd036fd3b0ec1dc493fe0461529580812f09be336fb8420e97054e2db233b93e78c6f6cc350f00bcf7e9838050111a9339da6c6b15db23071508e6d5ce0cb8a8e0eb0f218c1dc93b077229c85a3ed8862241a0bb36123710c451a7757572f7aa2bb45d8ad82c3943f043b3f2d84df6dee188c6be09f70c29106b8ae419562574ca58aedb662ae3adce30026251b8e00110bcfcb11cbaed350bb9a9a947d2ccd35cd924f886945b4b9cc62ad67369dcea51429d2630f74064099181c32e4fedbd7b32c6f0041e4fd85b795ff4ba18f95a9a1a0a9638d8b305a6a0621d75fa7068b92ee8b75a427b40fe2c1862855b65b7a464055beadec1f4fba80a90a927507a80b77e1fff825c835a69f5748d5479aad1bbbc6a3c99fa1e3d91e48a4547fc24f4b8b04d8d1e91f9867403760ba24a0c634dc218b8bfeb25a3cecd29fe85117a4150d85e5ee9a27b5349affb4305b2bb9ae9707ad8849f391975e48672e050b4b91c489d0711eaf2ed75cbee56126ad9bf8c5bf4acdfd9a6468cf18067ed84d72045de9fe4128e97b78eb8b27c593fc9b443e85b32d1e154b5cea6f269e84d8fa3b67edb90cadd3b55444bc6cb9d09895ffabb64f4f4cc5a61880de54369fcf1814f6182db943e36d7ffe1d1a4b9273f9ed3936de1861b15d43b0edbe6d3e37f1f5d7ec49c302e02353ea3536392b8824db21ad294eff2ffb383b9f02f091f3c2b9e85184cccaeffe9e21940785bf05e35e7318b952392b1a4b2365bc36c1b27c5e55d3e06ca1c4d4817252a50ae054a5aaa457028fe3cf301fb1318a712a6295c2266fb7a625cc4d603f2b8155ac9f39a4ad0c94b3ff1bab5d9f3988b0892afbf0acd3166e65923371dd7372bf3717fce675fa855491071f82b937e120f40d3a0b65890f3bd8cd18fda0d41917270beb18cb0f47b172993a09e6476bf34f220a4b37574790c1cf8c6ef86f121427e7fd14461b4fdc7dba19d0cc9b139b337353dad7583813e48bcae158ae6234a48de7a57fd6b79d7bd4ea252e3fb27ca3de1884daef998c533d945e69d5094d6e5043c0c0e8b8f897529bbdee7eb262076056b72baa176f03b8fb5ee6a3d59fbf3707eb8c4c61f8d30a8817bb5479056096b80fce735a9d50bee2b04b6e064bcb6a531c07b9606b9cfb2fdba34ab14d116be6943519fc2a44f2b2f1a5da8740cca4a8d517e41da4c67587cd0a49bef65c54aab085ac04b97c34c14bb4e70fd04b3746b6b74f9cb60f486b51b982c7f182866288ea4dcc6f73296e5fba1af106c0bb"}, {&(0x7f0000006f00)="f0150eed320905d040bd6b2fcc21f99eb0fde2d928ced4099a78c61e09d1a253e4df90835266eab75f9e1820"}, {&(0x7f0000006f40)="9e168c6e8cab92758fb1fc3a49cf6c199a222536ad49f499fa5e2c3b821692448f7e18e087f64dd6b0550446783e2257098e1db8a29f997fcd90748e26688baaae79f465cb4da6df7a5a3783fb9c60016d7bfa6434a9d17c3c3bda746ed74bfe03b905a4dc40898734d5a00b795a84f146ad8cbb4fad02929e0adc4582bc5f2a09507c634cc04f1910d983ddd5364707425f68fb5a3f2bee91a7ca18348e5d91279cb1e893c413a96111ce7dfb3fb31dc93fff3ee49780e5b0711dd082c8969b8a"}, {&(0x7f0000007040)="7be4cadea35f8da845283107dfeddcb03fa4492091448b1b68567d6986e4973adb3a9248305195690a6870ce053264fdfd84856d0e914b02f11af97d75"}, {&(0x7f0000007080)="23b6c3435d291fd5301c58eebc236b1d75ab2e4cad70d2f14883dad1a3a95dfd03c546956e137654466d2f5d53d6308b7ac200331e1b485369838a59ae511ede872e0d91ef"}, {&(0x7f0000007100)="75237dd2c6fd567220e51d737b8df66af64f773859a58edef0ff8b292a9f6f7e02567dcbd4bb578179c665b7c6e75243e992de5ee1e03adff8e40c6c68a8574a95c67d2013c14814b5e77d3d97c33c8b3e2ced73b25ace6bb3559d119267478a4f3b7aeadd889485f21cdccffdda172e14b44f819124dc4ffdc747cc54b7bde93bd6e59d54eb035839aabf6e2855ac9e142bbd6620db1821a3f196"}, {&(0x7f00000071c0)="8557c0102c954da4885daf62089d91ee47f2beb519f67b0aeb"}, {&(0x7f0000007200)="d03a551d62973a37d0b1cd1221628d8f087dc6251aa25c92a5433c8992df47e40be8669f7793ac8a9b06c2b8b84b2f0cca17d52b7ea5216766ce0e50b809b3489609ce96e2675c3b26dd3e8de2a131ed19c5f18df9c40eeee51be8526be21eb35aac2478c83f3a6369115b7edb3b28e499858756daf195949a0c4aed9bdf78c69c160dca2ecb810ce9e8edfe98dc7e9263d9fcdc367eb321702b99082614615cc7f798cf4638279e2d5beeacbf031585d1da4c6cdbb6629b3a7da3e22c70c5"}]}}, {{&(0x7f0000007380)=@rc={0x1f, {0x8, 0x3f, 0x27, 0x26, 0x80, 0x3}, 0x5}, 0x0, &(0x7f0000008780)=[{&(0x7f0000007400)="2796c531b9e61ea25331ff8c1c22c30b69af606b433171d3e2357a49d078b2a480ab72eee55fd0d35b4988509d47586dacdc53cd5fca8d9a84311939d18390059d2cf2badfe92af322eb59f29386c255fa686b94890d92366c00724db68e39b6a59b1999d48156b99b4891d30558f43176ee106329e166dda13e5470e18e4cff071df66910c314340cbbb87bdf016e7a0799fdab215fc4f1eee37a7816a178faba32561e974f0b6697390bdd1f0a8c2353baa177aca230f33629f07a47f97fcf43858e3a3d879fd786007d8aaf02a0affc79bceade0cdf660e39fb63a6372b34"}, {&(0x7f0000007500)="e1cf2267f7877668fcd810096cc18e2e7b920623bb14af37e5033896c65b93843770aec2cfe55994f48ac7fedf728ede4f80f560087fdcc6847f38ff920944c68e80f781f2640612ca4697bf7ff838685c2abb446e28464de1894807c6960188f2e18b87f4bb60493adcc3197fffb6b24a7bf016c041c673b7a1f58e5fe7e9b05d523e2688b277ec537f755e730bc3feb0d30c510786ad69f360946172f79c08b3bfbc86aa192ad133b8c6993466a6948a169b5e1bf6c47304abeccc854f3217a3cc89c592003f9c842b5e3882c85114bd7bd275e9a4251bad0e0d235115e0b366859b874bdc8994d298fa542bf4bb4ece74a0f1b03205"}, {&(0x7f0000007600)="949c26375354ad8072a7ecb1fcd5dadb6dd341413426c362dc0b4fe4860e457b6a73e3699ec5ac2fb4764f551cd64c4760ff8e5e2bdabc5f0fdb1ebe921897091099d82cde6a95b11b2fdeac6209374afbdc1037a62b5717189d172181e63ec746f1a5562935a903c5bc335cf9949dfa110cd80e43340bc73ebf87b94437bc9aaaa34116c4e76b3099936af241538fda6501f80e4755f38ec41109be2dc0bccb321adf1f7eb1e310a3dfad500ffd073bb902"}, {&(0x7f00000076c0)="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"}, {&(0x7f00000086c0)="e41030778f09517d57165282e72939bdeb015078c0bcc98168033265bcf47a9a45edb3bfce2bff30fe45873a20315d93d921e353139c984e8de4145a085e34bac4b84160a3a9453b0f4b45afad6ea96baa34857f3aa18fc0e95ce16362f206d0327c4cff295df0e55295e546e27a0ed2db171f26309ff5c57e21cb8502292556"}, {&(0x7f0000008740)="a22524b34ec4cefdad9bdb034012c661afb0c0fe1337"}], 0x0, &(0x7f0000008800)=[{0x0, 0x10a, 0x9, "ca01de600d052f6fdbde3b2115fec586518fa9def25b4e67bb5f6b795f5d5976e1f7e1e5c6a92b26ee2b94c20f59ac3eb6d0c0782f652b8e7c61bc7870128b779dec6f05fc92705c6d1fb0fa86579354479fd2ea64731d25e9981ad8d85408d6c7be256e5b3bfd866bfe02b1b9de73d30a982126d9"}, {0x0, 0x115, 0x3, "23d8afd33a9b654845e6c920adf5e8a3964cd7475929c9f30f785268e36f4df207ab852e506325211266563a5515878660bfdab930af7077cf95e46d4cf1e9616cb5240c272d8646598b4c7c5b3f683d86ea1e5d45279f01762281cf2db515780261a5109252d7163cc2ae149326807968681054f65d054d080f5a314b9b73435df776a4eafda28f40cfe9de18a3c4be932ae29b8d4e4946b220010bb81210a5779cb8f6fc3ef71630a75a7208e49ddafba4e91843d977fb49812f641320cb0ea543d1409b1e2cce44a869d299adb15205810ee1fb10"}, {0x0, 0x111, 0x4, "ed4639ebbe914b5e86a72d0a998a4afff9a995839caea79b2975e59e8faf72610f360868a8223b0799c126b5750c62c8e18fc9cf249026834f4c4d608cd0ab46a08dcbae0117465c34a1e3cee11bcd27a8399238f4d3c6402e934b676bcda590d8de17f00bb29799b08d80e5bec5b2a52aed1e283f8ce97bc0f3d13a2f1a"}, {0x0, 0x115, 0xba, "fba3b381c9b21051ee89"}, {0x0, 0x107, 0x1, "c92abfa3775c99a50b74f774b98eb6cad614d31de1d3854e5f95951001652a17cc22af787c7880d331c45484fc182adf42af9b3d1adac18141203c86a4d789ab0ac28e4a68b815f07553fe8a93f5c5c2d08c0db97ab48378d0db94f2e1b588a3bd271c075f6fef013f3df169b434e0bf89eccf7cf017de1ae0b21ae512a769f7e4c0e1f18a7a4a45d9cd895509a8ade85cb117e0f681970d4ec983fb7d9f258897da66ceffcfccb60183f06ffc47e6e364008d3f5fb61274346c46ccbbbca73524a3ee675e01942fd04cab2c95fc204940789b70ff3dca31026ab94d447198229bd57ddac058c4a4d42f618a147e3017bda4e1"}, {0x0, 0x3a, 0x8, "df120174d05e967f3eed4a0e6d9ca231dc7cde7a2aea995ca80b0a1ddb09dbe206809f2b42caf72a09000b94b920e28c5ca49354530dced6c19f20d5a8e7d6542ace40584510414eac2d99987ee3eb9b37fd0a25722b9e9f5e151b3d7e6259bbdf9139062e84835d65b2260710aa7ed1f958"}, {0x0, 0x0, 0x400, "f2746d46f06501898873ec56d631105a74581b8b07d1e064cb09cd54c240234fb9ba1dc879f702f4e920919fc4dc9372edcd164dd6da9d5b75b0fbe09acd8cfc043abc0b4c615147c72b1e475ed3bb1474d65546f1351e4c83ebfaaf3ccb"}]}}, {{0x0, 0x0, &(0x7f0000009fc0)=[{&(0x7f0000008c40)="93ab4faea4d9a76006399c2be002ba7efaeb7d6547aae4e9ea28247bafeaa04fdc5e5e31acc2005ad40ba6f92d8054fbdf281d09f0cf7411b38a3c01e7099ca9216f5308018a675aa2a3ce6889c1a0cb32445630e81f6995ea8755adf11dbc77b328910af632bc41e7f234b3e37908ab98f26997ffca739988cee4756a52f12bc735e415a2fb3904218f34f21ce871a9684dda4b6657e3b412bb9d21ace3fc10256f11c8ce7724c0f0fe9d77"}, {&(0x7f0000008d00)="4d89a0003ea462346e98f66d97fe4ce2c795c9602acd831fbec9153fade3ae80e0980504bb6f9ea3096fa0708653a256ba0afef6a4bbe49ffd1fd8bef5b1391b7b943931cd37de0a382710eda0271b404c2bb1170fd7fe353f8909554ecb38790e0844c230a52570b4afd0bd97a97f284215d4524c6417779beb6d189477f6d084b3dcec9d9162d5758e415173b5e927891f83178467f163a3e200366996e4"}, {&(0x7f0000008dc0)="9a0ac4083f55995d0d5c1cadfb59c36708c230f041e40e6a19e8e0c2704dd4345709a60a39c06bb43f3ce526c28c09206950ff163eb8bea7f66a87a747ced0a6f11f7d714a064322fc9810d5226910d5ab17d1766f57ef48cbdc80ae09888f65797ddf9f9017449598e573cb84dadfa5cfb1418c518fcd0716da59323649eced08f4ffc92c993afc47789968c240b9e7c6898819d550ca11804aee574cfba41b5a50f648a7a2d8451137b1691e7f0ce095c3ba402435e069376a62f942a7471e0b16e219a453f880ac590e08e901f2050a39ac5037c535914242aa65c0ccff1db32fc7fc60f7126877"}, {&(0x7f0000008ec0)="34021de60424b3c8afaa34484955c54a0a3018bf3dcf9b6f62a19f6edcc2c734bc90be913949af9daf9f5bd3f9383d1f677953aee56d0adbd52ace368e9498ca63bf29339289b5690a9395765b386a657abe6b323d7241cf8a4f6c49e3f7529144f0f03ff9f92108d9a5a9e6f16422d175ee9c552bdb00f1e00441769e78ce9d6a803bb8f78374125bd2fe36c94cc8edd43072d10e66b00c00ea189ceb8c45ac24611021d11d97fa0330bac9313a9582d96ba806c112efdffc896285afa1f7d2535d21142d231f6e6c6892d7e288"}, {&(0x7f000000ac40)="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"}], 0x0, &(0x7f000000a040)=[{0x0, 0x112, 0x1, "f054e3f80ebf5465fc8329ed9fc5177b52f86553662565f0558acc29314a154ae98c8b7326858e644fce03047aee3c841c0f04f6805adb29cfe7b4013055da8b92ee1dd3413b4a4d98003f95f7d21236cb5a699fb75f2d22af89cc14530ed321375463f22bbcd262c5fcf99bd3a6b8778f1ed81e19580bbc556e5ed854f08caf7df593"}, {0x0, 0x0, 0xff, "6bc620b9b03468097d3bafcd392046dd64"}, {0x0, 0x111, 0x7fff, "7e5af06337fa699590b5d6505bf73446d22b370e8f3ae86656908f7debff4628b02c53931cdf0931f439c6a908c4de15a694ac627623a8d9870589200cf1759336de1bbb969b4aad753c1bc2f7f14c192ad8da8173d908e17281a83c26e9e7981edaf977677f50f7a39ca3b8171eec568c94931e56450445f9e72931823cb32262cd7b1269dc25bb9a0682d0576f1cf5698c5368f28225b698aabb0b9ca367d30fd0abb2a65aeda466edd8be"}], 0x39b}}, {{&(0x7f000000a1c0)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x0, {0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x25}, 0x5}}, 0x0, &(0x7f000000a4c0)=[{&(0x7f000000a240)="90bbc5bd91597eaca19ac23c3306c12828eccf6e86e2f23be78615c9c3e24014ad42047fcd0365e1d64a7e52adf71d613d2a8195f101b8fb62dacb63f45e94b6a55e2ade492352ec24c227655736c5ea730e126445706546f1ca4b058c95c56104059991367323e05f6ccf3549e7d8059244b5a993616bed3f784a85d6b0"}, {&(0x7f000000a2c0)="66b1cceaa00f1f29d74434ffa60b7d4af9231d034caf1af7fe25f76ff1bac1792c4c5f414a30f916d874c9007ea2ae0012e6efd2eeb7b6073c351fc46e1cc6ed77118cd2ec756a88964b99b9c1102fb49a61c162310d2c3d7610552fc6d0539c078952fc63ba52d44280ccf28bbdc6a7a255d807b48479e0c91ee6e2202bb523a3d40e"}, {&(0x7f000000a380)="cf63d0adaf432b009a9a9fc0bc3eeb35a87b894ec36c89e04dbb160aa3b0c12d40d3e7c6aac095f477df08aca3372d3187905f1793a6bccb3f98918d74c1add31bc15fd467379b170c46c43749f7a22e0e42922100b948c2756868a2db7f88c8744fdd7a95e63aa6302825be49c69f7ca01b0e3a09558fc4"}, {&(0x7f000000a400)="fe647257db"}, {&(0x7f000000a440)="00f70430a17a117ecf475d9f775f7b200c8b062bde1a0c84e18a7394dc2d05f7454da89c454ede59367d537a10da01dab78a6f942b042424bbbf77d778d7c2f8b2c955a289d75d88c2bf010e07376179e365c492"}], 0x0, &(0x7f000000a540)=[{0x0, 0x104, 0xfffffff8, "09c048bb1b5781f598067369f32fd659861fdc1ceca69bd2efddb5fc1c7d4048b09c3d1e00c990a91d004826d2eca318d07f698c1dc57654e9a640441ff021d33c3493f31504ae099d9aec98b33a8c500be99d6764aa3bc2c0b76fd94e11eda911f6e1883382875e2cc0d5c56c28102c4d1aa7c7"}, {0x0, 0x10d, 0x9b, "7a70ea6137d7"}, {0x0, 0x107, 0x3, "274e54732ca58b4d2b8052eb9a61e80173f00266689bef662b533d93b5b8f55699e646d93b5c196baf8c9b21a28663c1cc1551291ee827fad9dacdf850fcd1e36dfd495377eb6df0775a7047d11000714899bd49dace4e20e2c5b7500d7e887a6d7c0c3d0f55ac60112e310fa6ade20cd00fe68bc6aba6"}, {0x0, 0x3a, 0x5, "cb3975077b98cb26911d4bdebc2f55fb3420ee03dc788a89a5e5f2323b41ae647689b5308d9b7c1e8789df726ca6"}, {0x0, 0xd1be0603df306de1, 0x4, "b655751fe8a490d09a7c670011c4f06f2f18802c170ed2913fbd3db1f0463a9739f734f40ed4c61a855d429905d6fb23a5731b6c3c2ce7b44788c7c1b3d81fca59f7c83bdee7c82b016bda87e9ebb29797c10f68d36b9e2d5c20d0ddb87eb311b2022e07a4ccb38893f4dc5c9c3a47149d671def916da52c0b118553bb9abece2e42a240ab83417db9cbfa68afc34d2aab72e6e30b899e256f11c1b10c6d17767f81db668f368480c3473e41a6fc9baf0c500483b91be78e8b0d56b34cd770a9521b31b40deaea1c6a6d501f3a6c1103c88ec5c669df7ca992ab84cf12dc0093f802682c"}, {0x0, 0x30d, 0x80, "373cd41277ef8ea98456e903c2d8303800bba2c2a631120c82ad670c15fee928a8ec4becf2fd5d99183759625eefd9b337eaef7de55810a1cdfb36b4b6377da4aa12e51a4eedebb6061e22f69116343cbb9574d20cff1caa5a1863ea4a199b78127bbb400519e42484d74a4ad24d5f74bd090691065c929d70ed8c5fc3efd7199bae3cbc157b3a895d0f0d80c578493dab146d388dda28ca0a6b67d2fd98a9bb1c6ea2b591f3b8da7273478e53b05d0a59de1252159d0edc8dbf0211e06adcda8038ebe85e36a56df93a2e64c4465a1ca061c1cae726c162d873924cd97ff380233b133b"}, {0x0, 0x104, 0x6, "a8346729cf217e1975466d4c47640803d9745d3e483313f8e33615bbb1745c2c76fe614479e3672350a0d8b66690b0a5e40048e647686d4dc2f60b53f6df2ae29818f4e26153688bc9842b3583371f8d44d4e857d9f25a5ee29946b2ed68ef"}, {0x0, 0x13e, 0x7, "ef9962b134a77fbf3ecfb95f69023f09e31638a8062ba814f30663caff656d464e48c3ceb84cd8d808278394b7feace0b53499feaf81108481b4809c"}]}}], 0x1da, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000040)={0x173, 0x10, &(0x7f0000000280)}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:18:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5460, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:18:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:18:59 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) [ 2366.070275][ T5176] QAT: Invalid ioctl 22:18:59 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff5000/0xb000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000)="ccf0ff080d0faa81eab8ca6961440cb17b173b22d97d9bf745cdc67b5ae4de9c287bce916a004ebcd8d05ee54a496918547496da43450d8ef4d7ae500dfd1c3199786d74479d9766abf15225057147c18dbf49d0e6aa46bcfc3c4a4e6ef301f293dfbb497e1be52de4a4e368534c00e39e7019372501d9320299f40f3ed6bd9c76f7f9a2b84c15a85a715b24735288cad78a9f1faf36e64715404f1d09d6ccc692", 0xa1, r3}, 0x68) 22:18:59 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x3, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) pwritev(r5, &(0x7f0000000140)=[{&(0x7f00000001c0)="522cb36df0512b2855b10aa14ed6eb6f55edf840fac3ffadab912a8e8e0978bb399564ccaed09e7cdd8d562e3a7ce861687ef764b073ad8cf78a36e192635653bd6d3a2177335771a789be2bef4f89e3e1c3418eefa8c127f123428c86ceb81952fa0e9120929b15c9da85e14b2ce33769e2ae11c502897240f9115def598e8cb7f4de70ac190de89687e537f987a84c97de0df154c90aeee8ae1144bc22e81f52377b34cc06648ab8df4477b174bd7e554f327b4247bea7", 0xb8}], 0x1, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) ioctl$SIOCRSGL2CALL(r4, 0x89e5, &(0x7f0000000100)=@netrom) r6 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) dup2(r0, r1) 22:18:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = socket(0x2, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0xffffff58) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}, {&(0x7f0000000280)="d7537400cb8a40825248c9aabb20cd22ae48ce4d6aafe02c5994fa975c942b68ebc903ba3fe6177631558d970f46ff4268ae962070c0f5b518f191d2c7c5cbdd77f76fc6a5184b3333d73cd09b9387404b198c4832e6a9bb35ba66c1a2e8eaafe920038105d1d403a2974c25aeb90e3d384cf345944a6389f23353c1aeb17db2a55950227c56a819136e2438d144200b2e4f6ae9c00d0618be2d156527dad036616b079fb905ce02c40c36d0268277d3d483dbbadf146905588a337a0ae4a488ca5773747a8a85556691b96b7dfa7708a11ad7be6b50410592354aa2d1ab7e7079818b1f3a8161fa57cf93"}, {&(0x7f0000000380)="f98f84cd4ac614ff9cd456624adcf6948636cbf3d24aba6c83fdf097329956da8da58b8c0d2b89a9635953a70fd66d2fb8356faea4509d24a53dd04cf59ce7f49578a12b9b294f8b072efbb2356eecf6"}, {&(0x7f0000000400)="bb371df32a5f3f5f3e2c74e00368100b7c105977c41f45350743e667262fc980db8410442534a1"}], 0x1}}, {{0x0, 0xffffffffffffffde, 0x0}}], 0x4000000000001c2, 0x2000c001) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x4000) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000500)=0x8, 0x1) r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000600)='/dev/nvme-fabrics\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000640)=@assoc_value={0x0}, &(0x7f0000000580)=0x31c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000180)={r7, 0x81}, &(0x7f0000000480)=0x8) getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) timerfd_create(0x4, 0xc0000) ioctl$FBIOPUTCMAP(r2, 0x4605, &(0x7f0000000140)={0x9, 0x8, &(0x7f0000000040)=[0x401, 0x8, 0x2692, 0x8, 0x9, 0x6, 0x400, 0x4], &(0x7f00000001c0)=[0x1, 0x4, 0x5dc, 0x28c, 0x7], &(0x7f00000000c0)=[0x0, 0x1, 0x6c, 0x7], &(0x7f0000000100)=[0x0, 0xfff9]}) 22:18:59 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x341342, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000040)=0x2, 0x4) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000080)) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:18:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x54a2, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:18:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:00 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000000c0)={0x3, 0x2, 0x6, 0x3ff}, 0x14) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r2) prctl$PR_SVE_GET_VL(0x33, 0x181bf) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x5) dup2(r0, r1) [ 2366.548975][ T5615] QAT: Invalid ioctl [ 2366.603340][ T5722] QAT: Invalid ioctl 22:19:00 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) semtimedop(r2, &(0x7f0000000040)=[{0x1, 0x30, 0x800}, {0x0, 0x411, 0x800}, {0x0, 0x1000}], 0x3, 0x0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000640)=""/138) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000040)='./bus\x00', 0x6, 0x7, &(0x7f0000000540)=[{&(0x7f0000000080)="db439139c2", 0x5, 0x7}, {&(0x7f0000000100)="844aa1e20356177d0e42e3613b44bbdc1f3a31d947cd1909a1f574131059b1d9b41e2c4878afcd5db2e4fe895ee4036f5530eb396739524380fae94fab57a8b691f9f8ee2b0aafc3e372f5c32450eac85743f34ff75b70e9af5a59e7cd97eb3f8d94160c9cdaf8fe7fe930c36fa15700f325e7cb5f5c461aa7d41136", 0x7c, 0x100000000}, {&(0x7f0000000200)="66e0636224ae3e3a4ccaac74de6470946e836bcebb49bcd6b53eacfb91fa08351306a45b4fc700cb5f5f5dfffbb38f690e4a91d9072f79ff11ce4c6ad13f2ddc5d4c521a18fd4a6a11490a32c5dd", 0x4e, 0x8}, {&(0x7f0000000280)="910a841929a79df35cca3242c13d5327cbb5741173e33f91394f57f174c3968541ea31687685973d47829b128f677b42fb8ce3bade995f039a888586d82d29bacd31dd5db7540e7ee44590883c2a9a529dec523f509c15fc973f79ca9746cdb76b7564262356c879f370bd1d720db67b566b7f", 0x73, 0x100}, {&(0x7f0000000300)="c79d7a9b70bb293042eb9d31f59ce1651a0a5d670f41bf9839b7acded59d80a03eb1d83eb0080fc60fa01fc39af54e4c31f51490cfb6772108fd8b3c4a9e1aa0173d72f04548f6c13cdc6016c3be4b64aee834227e89e083ba41ab4914b848dcdc2eb2e626247546613fa4c4e5860977dc0377d1d7dfbcc500f72e76f1259c3cb5", 0x81}, {&(0x7f00000003c0)="5c6f5d18c9dcb55d321d246c6cb292b95f6297131bde52bf3fe3701a59de4d19423a3acb118d337d85982a3c110a005e76db0c65f52af8c425ecd90ed16036d203092b4bfd9b68d31a244845dbe8ead2956a75706fbc7b770987c64556ff07d37be32bb029cce77a0ea933dea0ed802f1a725ba3bc84aa7f45421fb2cd255401d44e521bd78de312ffd5df5dfcab00e50d6125ce0b3d69fb6ebc00d17b1f9a7171eed6d9274d4d4dfdf195d6c80fed133664d10bfc022fa190b1effddf7b0d20d89af6842a75a8c964faaf67b36a99e18993205365bb19bc4e5e438e0a4c20ccc347d5c255b1", 0xe6, 0x9302}, {&(0x7f00000004c0)="55648b8f44e3509183d889085bbd242cb582e211408c7da017a457f0703cbd93d14ec1895d4b38c801d96e294268d1665bf4911b51f159639a33371b253eac764136ee5a7a9c7d", 0x47, 0x1}], 0x20, &(0x7f0000000600)='\x00') sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:19:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001400)='/dev/cachefiles\x00', 0x4002, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000001480)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000001580)={&(0x7f0000001440), 0xc, &(0x7f0000001540)={&(0x7f0000000040)=ANY=[@ANYBLOB="e6acca9e8e317de05115cadc2ac00d104ec3e14038ff4f133e5d7573dfffb48eb74fb431c697ae8366f7ba928681d31428fb56a98714355acc38d5ec18d77545fbb3bf35a8834e90fd117f584f81d7df40779e8eba872e85979c95190baac613246169658db2d36f1ca36c234cb1790990b346888163a1e706525477a7ffffff7fa97023e9cf63bb3e9a045a1e5179e02b590dae6f96c0f2a90da867eb069a1febeb7627b331191eefc5ac7d32996e4e6e668baf3ed58fb2b5466335ce52", @ANYRES16=r2, @ANYBLOB="10002bbd7000fcdbdf25010000000000000009410000004c0018ffffffff65746800"/98], 0x68}, 0x1, 0x0, 0x0, 0xe000}, 0x4) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200) preadv(r3, 0x0, 0xff14, 0x7fffffff) 22:19:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "00000000000000000000000000000002", "20040100"}, 0x28) 22:19:00 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x2002, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000080)=""/49, &(0x7f0000000100)=0x31) sendfile(r1, r2, 0x0, 0x4e68d5f8) r5 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet6_tcp_buf(r5, 0x6, 0x24, &(0x7f0000000000), 0x0) 22:19:00 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x7ff, 0xb, 0x4, 0x442fac679781a390, 0x4e16, {0x0, 0x2710}, {0x1, 0x19, 0x0, 0x80, 0x4, 0x9, "b7e46329"}, 0x7fff, 0x4, @fd=r5, 0x1f, 0x0, r6}) 22:19:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x6364, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000, 0x8ad, 0x100) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f0000000000)={'team0\x00', @ifru_flags=0x1600}}) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(r1, 0x3b64) 22:19:00 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x10000, 0x0) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x4, {0x100}}, 0x18) r2 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e21, @multicast2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) dup(r6) dup2(r0, r2) [ 2367.162556][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 2367.162574][ T28] audit: type=1804 audit(1578781140.672:435): pid=6323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4046/bus" dev="sda1" ino=17042 res=1 22:19:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "00000000000000000000000000000003", "20040100"}, 0x28) 22:19:00 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x2710}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:00 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./bus\x00', 0x40, 0xa0000000) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x18072e405a73212c, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000100)=0x7) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) socket(0x0, 0x0, 0x7) sendfile(r3, r2, 0x0, 0x4e68d5f8) 22:19:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/80, 0x50) getdents64(r0, &(0x7f0000000100)=""/64, 0xfffffffffffffcd0) getdents64(r0, 0x0, 0x0) mmap$snddsp_status(&(0x7f0000ffa000/0x4000)=nil, 0x1000, 0x3000005, 0x10010, r0, 0x82000000) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r2 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r1, r2) 22:19:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7001, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) setrlimit(0xc, &(0x7f0000000000)={0x1, 0x4}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x2) [ 2367.366493][ C1] net_ratelimit: 4 callbacks suppressed [ 2367.366503][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2367.493762][ T6496] rtc_cmos 00:00: Alarms can be up to one day in the future [ 2367.550127][ T28] audit: type=1804 audit(1578781141.052:436): pid=6505 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2332/bus" dev="sda1" ino=17153 res=1 22:19:01 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video1\x00', 0x2, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r5, 0x0, 0xffffffffffffffff, r4) r6 = syz_open_procfs(r5, &(0x7f0000000100)='environ\x00') socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r7, 0x10f, 0x80, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) sendmsg$nl_netfilter(r6, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x21080000}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)={0x2ac, 0x2, 0x3, 0x6c1, 0x70bd2b, 0x25dfdbff, {0x9, 0x0, 0x3}, [@typed={0x8, 0x1d, 0x0, 0x0, @uid}, @typed={0x5, 0x53, 0x0, 0x0, @str='\x00'}, @generic="433c4ed610b1a145de4f906386d8fa09c3b62c132f14286b810764d13b661a65526c997c0cab42a5d09d000c", @generic="9a3aaa8bb6be98e80989057714b0188a1dae95b89be1a9ea0499ef429909c915703de1d978d701587d9e86c7b0100cf5af14f9214bad0a71f256957e71649177", @generic="39b02e370349eb8f96b184a2523cf0a5d03e16f47072a24ab688696180ec16c3339c188b54f26feed01a595acc4034cd355da3cfa8e75a8867157dcde82c4b083fe708a5f8af23bf4aeb7941b1b59149c449b7283f3ab26990258f7000e0189acfdbf5de0046b9b39e60cafa009a5583ee2702a76a547216ae2d096a74a16e3424c5ea7612ae4f328e3c608b3fee5d065715a208f3dd30b8102a6ff6bf1b1581325c8a", @nested={0x15a, 0x3f, 0x0, 0x1, [@typed={0x14, 0x69, 0x0, 0x0, @ipv6=@remote}, @generic="a6c0377f7101dd4031302bd95389e1cc4dabc7863601badf6a98", @typed={0x8, 0x14, 0x0, 0x0, @pid=r8}, @generic="4d055cbde20840a7fa89ace83e6befdca63daca2ffbce26b0ce8c8fec31ef855dcb240d2b1869406c2bca2a1314b4f32f668cdf79628abf150015073a8a301055abc1b061eaf7c9fb90f8db7fa461fc52f654b0325c2249d9aea8b7e5ff4369d6e1b7e8a36b788a236035981a0000af735e670241642c0ba76367dbe17cac7ffa31d2de6f8702144d74b962e9302e5ad351e1f14f741d076f493e26d711efde91f08bf7b153fc4bd45d717872544d167b20ff0775185e6d6103914a8e3f28694421bc90150c628e191e3da5008244c", @typed={0x8, 0x81, 0x0, 0x0, @ipv4=@remote}, @generic="b66fa9d18d6ff2108dc5e1066cb8a52f4352bc1857aab25e6f2842baf481525826575f06914ef13e7c34a036c42c6991b4432d74d41f0a299347e59d4a8de7d95a5f1be17f3dbcaffe"]}, @nested={0x1c, 0x6a, 0x0, 0x1, [@typed={0x8, 0x59, 0x0, 0x0, @ipv4=@local}, @typed={0x8, 0x8e, 0x0, 0x0, @u32}, @typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x2ac}, 0x1, 0x0, 0x0, 0x80}, 0x8004) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x1d, &(0x7f0000000080)=0x6, 0x4) r10 = dup2(r9, r2) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) dup2(r0, r1) prctl$PR_GET_SECCOMP(0x15) [ 2367.672215][ T28] audit: type=1804 audit(1578781141.122:437): pid=6600 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4047/bus" dev="sda1" ino=17243 res=1 22:19:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "00000000000000000000000000000004", "20040100"}, 0x28) 22:19:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x28100, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x8, @rand_addr="deea2808ed33aeaafbf98a978e75b76c", 0x6}, 0x1c) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x28, r4, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}, @NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x4}]}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x88006000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r4, 0x8, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x1}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x29d}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r6, 0x4020565b, &(0x7f0000000140)={0x2, 0x9}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x800004, 0x40010, r2, 0x8000000) [ 2367.832575][ T28] audit: type=1804 audit(1578781141.262:438): pid=6814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4047/bus" dev="sda1" ino=17243 res=1 22:19:01 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) 22:19:01 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) recvmmsg(r5, &(0x7f000000bf80)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/36, 0x24}, {&(0x7f0000000100)=""/112, 0x70}, {&(0x7f0000001200)=""/251, 0xfb}], 0x5}, 0x10001}, {{&(0x7f0000001380)=@llc, 0x80, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/12, 0xc}, {&(0x7f0000001440)=""/121, 0x79}, {0xffffffffffffffff}], 0x3, &(0x7f0000001500)=""/216, 0xd8}, 0x8}, {{&(0x7f0000001600)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001800)=[{&(0x7f0000001680)=""/88, 0x58}, {&(0x7f0000001700)=""/12, 0xc}, {&(0x7f0000001740)=""/151, 0x97}], 0x3}, 0xdbb}, {{&(0x7f0000001840)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/139, 0x8b}, {&(0x7f0000001980)=""/155, 0x9b}], 0x2}, 0x4}, {{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001a80)=""/238, 0xee}, {&(0x7f0000001b80)=""/46, 0x2e}, {&(0x7f0000001bc0)=""/96, 0x60}, {&(0x7f0000001c40)=""/123, 0x7b}, {&(0x7f0000001cc0)=""/110, 0x6e}, {&(0x7f0000001d40)=""/128, 0x80}, {&(0x7f0000001dc0)=""/142, 0x8e}, {&(0x7f0000002040)=""/4096, 0x1000}], 0x8, &(0x7f0000001f00)}, 0x1f}, {{&(0x7f0000001f40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000007140)=[{&(0x7f0000001fc0)=""/2, 0x2}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/4096, 0x1000}, {&(0x7f0000006040)=""/169, 0xa9}, {&(0x7f0000006100)=""/29, 0x1d}, {&(0x7f0000006140)=""/4096, 0x1000}], 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000008680)=[{&(0x7f00000071c0)=""/16, 0x10}, {&(0x7f0000007200)=""/254, 0xfe}, {&(0x7f0000007300)=""/185, 0xb9}, {&(0x7f00000073c0)=""/81, 0x51}, {&(0x7f0000007440)=""/4096, 0x1000}, {&(0x7f0000008440)=""/119, 0x77}, {&(0x7f00000084c0)=""/244, 0xf4}, {&(0x7f00000085c0)=""/121, 0x79}, {&(0x7f0000008640)=""/31, 0x1f}], 0x9, &(0x7f0000008740)=""/4096, 0x1000}, 0x9}, {{&(0x7f0000009740)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f000000ac40)=[{&(0x7f00000097c0)=""/91, 0x5b}, {&(0x7f0000009840)=""/236, 0xec}, {&(0x7f0000009940)=""/172, 0xac}, {&(0x7f0000009a00)=""/4096, 0x1000}, {&(0x7f000000aa00)=""/183, 0xb7}, {&(0x7f000000aac0)=""/111, 0x6f}, {&(0x7f000000ab40)=""/223, 0xdf}], 0x7, &(0x7f000000acc0)=""/123, 0x7b}, 0x5}, {{&(0x7f000000ad40)=@sco, 0x80, &(0x7f000000bf40)=[{&(0x7f000000adc0)=""/4096, 0x1000}, {&(0x7f000000bdc0)=""/29, 0x1d}, {&(0x7f000000be00)=""/104, 0x68}, {&(0x7f000000be80)=""/189, 0xbd}], 0x4}, 0x1ce}], 0x9, 0x2000, &(0x7f000000c1c0)) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f000000c200)={'vxcan1\x00', r6}) sendfile(r2, r3, 0x0, 0x4e68d5f8) 22:19:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7002, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2367.877319][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "00000000000000000000000000000005", "20040100"}, 0x28) [ 2368.065843][ T28] audit: type=1804 audit(1578781141.572:439): pid=7029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4048/bus" dev="sda1" ino=17009 res=1 22:19:01 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x101080) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f0000000080)=0x81) r4 = dup2(r3, r2) r5 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4000) write$snddsp(r5, &(0x7f00000001c0)="0cb12943672a9948fd97e94f340d8aeeac9790f681510a125e5c4ec22dab29f908e9cb9974bdcd5fa8890b40ef33d7e55e1cd2841158f3e0768a4e5e643556ffaa4f48aa9a7d86f9e38b0e270bf39dd9f73f937c7c650a567e599559d51a47224159df50a143598b39fdc1c76d731076f3ad287ce5793c6d609fdea4756a96e6844fd7986c2f2b6f39fc5e8aeb842d5ce0279c801c3c2035b6497937dafe8cfb53cec8eeaf329e9e8cf931c53b82850f88a240e0f61ddb377efbaa8bed9af47b756ba6b920f05ea5dd77895ff7cb0d9cdb681b9a5065edbbf0727f643ce601470277a83734dd9595fda6024825bb87c8dd1320c315c829c67a5897d5c328f10d601f824a51999a9657f7cdf29741a24900424e975fe6b4d000853a20538e8f2aefb68fc6ddf17621551f17c4f8ab6a40c3d0e86eb7a2a3c6d0cacde38b86626ae744ca08a3316ceb21460142f246a2c81da73868b25af89c38a84853fe227ac21ec9a7458b6ddc5bdc652fa692e9c22a14c8ee226c6b44a95262df52aa47c3189a409490fa39add785ed6c9dffae9c52776578204edcd9fdfda9ee6f17b16533c999ccccc46ff9398c60fcd8a6024146efd52120150691a52fdbea70427023bcd4b40bd1953a4b4f0b9e06d31e347f91c5035280147f0c3f251a34385eaa55c373e804b3f9612ea7eecb5ef9478e8281cfe152ab2b54ed17acef66e3b13215cd397104e1e16a3ee4c90bbd85e1ff326cd77203c705f8b92fb4aa06d10170fe110fbfe073b268519248a2057e806846b7a030829f64dcc672314d4282d718e57c5b2c2995915f6d80bfeb7d681c9e9f62280230189f14c5401c79f3b666dd52af7947eba0924ba3f63421f77d608810275aafc0289796803bb72a275d51bce3cb13df6262e03acaed325da2cf86812d22356dc4a6e9ee1a2362d34cd0d256ae46a1bf0f129ed5d5bc880bd0f962b58b5d735c164931cec6789222bad1f3ee2582a0cf26c3646e91caa3f0a257e352e7166afc30f14ad1a8abefea427b3db51b03e19d9bbfb03fef463b83a41fbc8b0736eb106821f01a97e4f1680239f8d389d65097d001ddcaf27a10ddb5a26537429d707a52fbffbca1bde07396aa1fd57ba8d87e2c23b8639d97a63d0afd9d0f0cda7a2b5a30d9a0244105c806416582b0482f4867b67df971c4183496673e5fe0c38f7cf03e5ebb26e7d957c040900eac0082ab4c82b23aaa1d38ea6c8af8082653f1c7de4a87461ba37c6e424a0bf0b200dde9759d190eb7d65acfee1f08bbfda69cfc4e190583009bb7ff402e55e8ec1467ff7667d756da3c6a63163f17751ecbeed927c16d96710e64d15fce1cdd78aa261ba2a2b70e29a2ddc2c84dbbb6193a4b8ff2922ea918e42c82424d9fa76b8256fe8d2b2af8a82e995b874129da07936959bde99b893decef2af3bcd122bfd0cfb8dc2c91ea532445ed40a93c391a79ab72b8e5076e6f2156fa4df81389f416517b4be7364b0bad5be647b5df9f6741ab2aff40a2c4a3c3b2da7569a8f2d280c27fdf53920748120d64c24ed0e7037f2a81f4920a6a101eb37f17479a532d1a34935dd1a99da0f0f296dca140c37b84738572527b6c695fc83ebb6dfbf71a3612d13b91b2d8d9644681edc2b352a753306088da79e080e9249d52c638ee3758d2c592df787203c08635685dccf54b14179718157c9d96f6b55e1a7d1c6a249813d97ab90d118da6305b4fbf572d05d259e7433a38374ae1cd051f19099e812c1aadf2d2ccf9964b41cf51c8cfcccaa0ef1ba47719451c0b01e52c5997d821a852786c5cbf7146c6f8bf2456715d80332de5020efa5762e646ffbf339861bcbb48d1351c5499391311f952314bfa9f5e13826c96b8def6fb979d61846afba349de47e9af80920bde4656fa32f5b028be902ba1cf6e29ec397a109dba215abd5417fa82d25cfce521fb69227d7fdcf09d94868f5d8d4a5a80638941fc77bb6c53039fa92ab61903109dd33c587c07d195626c021532d71adf2c4cc35244639ad69c971605d3eba4991dba04912519b1c6d5c304f09a9f59dc174775f86c79f5cebf641acb5026bacee021e8128542bd1660f123010029b5091472a65bb00a2de3bccf855d48ef0ea5b1bb2528d406441e2868c6f755cd944d4b82fda7b1bce1319f65827bcdf381876e182543cfb6a40f827a3ad9f2307faa98578e4033ea07a74ecf88b91d24fa40a80e4c7beab19c084a3a6363c56c7e66955446f2d9b67cf65ca1ad978e610d8f561fdf8b5f718e0ca29c308539bd7efa083a13cc55b480f8766d5732b9c14d3127bbbad9f43cd369c6cfe08a40cc1d3b1c4961350773f24218df6ec5a899f8b566ab3e209bdffc177d02df4bef59dcb5eb133ce54b4f87941441c0941c7ae92743ee9b943a48e2c55790292170e409581935029ee45333e65a3394ad8d3a8f4c72f3e8b6bce7fd685332b69537ba86830d9c8fe309a079d0e79b83d6d9da8efb8b013459ad575d5d4345a9fe3ec8d8324203825d160b5f17e3ba483f69588d1b83b3dfca9cfcd1f8c9b87bfe1963ea37e5889641adf34eb7e9fc3447ea7fd7b006e717e56d39bd608e920ac0f16805c746c727551a6bdeb6b53c0c305d5cb7bf35e71c16bea3566c110118c7dcab6c0e75827977638019e1840ef8eff67f8377ba2c908529d5e8aedd787c528a1ca79330e7ef523bb1f71b3afbec34247adf2f346e7aac30a6d106c4857626a49f948f53c830a81c3e28da5e67b25fdefa38220ce6453195730d18c0b6102ebd08b36438e0a9bceef89cf9bfd962861d560505c23bb3817ad5f0c76cea9022f8e8baf3d5b3f06072283b0007fd5d6cae3bca235649f50bebdb35db3deab1b5adf4b9bb484f5479bc472dfaf4594b7ceae362f6ec4694a876c8d234dae8abe2dec335a462f8ac4c4391ca915ce383cb25d332ca59ce9b1b846b09aea90cfe3571a089eb22ad42c7f09a1c793013ef52b0ff0db6836beffc5c5f89061f7b3362fef2aa0341338fcdd29fd4f6d2947de5bb5d32db279ac6482d07909c5bbfe8ea20762a1ccf496dc46f307c367e66329a77845d4fa17c62d904d7b942569e5fb1a0a2e075837b605462ad9d2ea7721c0588b12febae32548f1aaa4aca768fedeb1c5df5415d20b39be6166b838618e8caf00b39db1ff2ba9df9c26162c99f64a3533b91214f2371baf46d1708a7daaf39bcf09d219e13d48b3f6e40b803e7494dc58af1b636922f405b72704a1cfe7ece2f971bfda9e3e38ec19f0c858b1e7abc61f43b7b2beee579fbaaae2d676f95391d6e0fa8984bae683341fa1ec31379ba85ac573f67e8b2a4bcfd3cf14a2ce3d710ff9b14ed5706ef1e4ef75fbfd9122d1b89314fba06c90607bc766dc167bb9dbb8c0d2db621fd2bcaa4989eae4e939649a5951864bddc743b7cbe79989007d26af7263103e62edafd2c910ac9882623027d4ca317c8d27d45e28e6e7e63cfbc0d5861165da0921ff7b91aae2fbf39f9b0f5c0a56e27a9b70f348bcfd96f7fe36ba0d4af6eeda5dc70cec449fc036b73e7989e6ac20f45f54ef1de9c5eb5d3881e336bc690cad0a160c674db8d1e0153d8517ff1eacebcf0ca67499f20b5462748feadfd9d7cc3c4b4688b30002d2d3cd6e3fb54de53a0d2875d99cc5feea5981266fafeb6de6f604eeb721b17f8918d21d862e45c88ab20916e41021b217f27f650cfad895cf49d80f2d97adbfbe290cbc9bae36341d0c3374c48ebb80a56fd107e7f1e964eae40cfdaf151556d4a9a60f0317025626d40bc9535f5813119b96a7b70eee6ffd960e0442a678696c57872f4e349df45ad1f7419a6c11eb8dbd7230f33cf0f07c42fdccfe9adeab2c5cdafb85ba349ec6d65bfccafec42ada5f557e3d0e7403570d7bf9fd0e78ec159a05a96bca3f8dbb1150ded0542af2e9de2f844e83fe725e94acd0833343abd67742bfea9ee41f01e334ffdf41b4daa238a04083d2e243e5ed69b1532c02e0da163843d3f0a1e5017a9da20ec1148e9f81d4710bf1b4698f19994e8c0626cc392f8d3a3884922289964ce65f419f5c7324e7ebffa01f73014ea8fd12744e9646e45b2e707053fb89d4f10f03cf57859c91227e7c764c647d0916344d1d30a33c6b7f14cf9ab0c7bc8a9ea7d0859c0eba667096f98c9bbd4cba181b6b3f908faec9f65c1bbd7d698a4965e1c357594696ed5780e08d1a0e635cc6d6c78659b30e6f760545eeed5d80eccec533cab15a54f805abde511c546173709576a5e3ad543ee9becfb34a51ca9ab537d1968789694c49881c8c08a27b5ae419ff8cecbd651a05f44e8ff08baa32e2c5b76b1970a7a75cc8d15068ed31015ec69ac24db87a3d47fc5adab56cef66d0a26e40b2faef10c0458edadf7c32d88779f6ae815b45cdfb5e57b822a8c8e408a72851e18404cb02b3f6a1813f2cafa2b42418238f71a0b9ffeb0e4cfb421de52d97048f92f8bb6445fe5a482037d51b89b213d23a595a0f5233ba5b8671957eefd1030c2afcbd81eec4bb08a7cdc16955c9820515278c8406b53f45267f55c0fc3b9cf1a8822e3ef346e4434cb3524883797107076fa3a9f32f16c1270aa6c19b5583170f12df775e072f43d8418dda7dda492186040af718b2d0b743387d4cc3e4cec8f548eae690cdae2347f7d89ef7ee59fff3d0e07b87bcaa70637472ac8e8601687a6ad74af9314f707cde97ffd160960635dd82a2d28305ef3fc38cfe29c56eed2807dfab850acede0c6a5b50dda0e73cc894e4ca2c1fce688a9d93b757ce11a16b29654249d2562a813d65c48bda7c0dc7fb477afd52dab09322519f8205e8e2c5b811f13dc2cd5232e8abcf3849a9f559b9210f4836a03f599ac5772a4ad6a261bc3ddb1b53e823da900ae40af5f7df454a79f7ca7356dd823e0aa7b89768ee784a0f7873a6c4b256751852e3708a23489ced4caf63aaefdd11a4514c52d106a3a8821226697b8b4e3010db0ea89626537a91f446f8b7f70052e025ab036657dbfc7491e0a55e9e03fd4098b803855e77cf3f36f25e4b17ad915dba625f37a086e138615c14c6b8d3b04b497414efc476e9d0ec90e81eacf159ad5d23ac11f06b3de32e71239f6a50b3441264cfa91c4166f18e6b385520a8a71f93326438609604ee6cd6b81860e3e581ada6e4bacf06852f5990c9d2e1c4b4203b8be6f3fca57f48104c4dbbc7f19471283a4443916d03001e4c08883a3199b94e3d88fc94e47a79669e13062c7222224f6dc8cc21e83fb78c22c37690fcce98b20c5cd77bd4004d3dfe6bf495fa21d0bedbc0bae86018f40f5381e3cff4646a45f9f7f02d1bf3f1234b09bbcb17a23d3e1360250b600db7e455e0b4f1fcd3af00ac11b4b113110c80b901f16fb4c1bc35ff3d088b7f68707b472ffa850d59ce4cc445052de095fe328de69187caffd9d133d3663f002a9b3b9072e5fdb37a81d69ef72beee756612ee3c03be6ee8f242b376ccd97f46624fbd141dae2a2cdf018073398ae553c4d924c195b9d18713617719c643c418670762981287be556920033b84d2539edc0289ad04a4fb06ca3f19c21fd39ca28121a93522cfb9b8e82aaed99317ba93cae85191ae694a49cea96ef24c5c539c934a5765c7b90ba05d97a1d8f6a275b4d82016e88fdf7de6283149c785aaf771b7b3a80d92c87b85bc152b4b4b380a0721a21d220d416a8a033a28f93fd59d64d033969eb490565dd295778ea0286c79dd8c3483e149f8207b7b9f6a3e109fb9d18d6f41fdf839dbf7974dd582b7", 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:01 executing program 5: r0 = socket$inet6(0xa, 0x8da42a4cd1f8a65a, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(0xffffffffffffffff, 0x80044d12, &(0x7f0000000080)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x180, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)={0x2, 0x0, 0x88c}) [ 2368.165751][ T28] audit: type=1804 audit(1578781141.672:440): pid=7109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2333/bus" dev="sda1" ino=17185 res=1 [ 2368.206309][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:01 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x7f, 0x400c00) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) move_mount(r3, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x28) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f00000000c0)=0x9, &(0x7f0000000100)=0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e21, 0x3f, @mcast2, 0x3}, 0x1c) ioctl$sock_SIOCADDDLCI(r7, 0x8980, &(0x7f0000000140)={'syzkaller1\x00', 0x9}) dup2(r0, r1) 22:19:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@ipv4_newroute={0x2c, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_PREFSRC={0x8, 0x7, @broadcast}, @RTA_OIF={0x8, 0x4, r3}]}, 0x2c}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@rand_addr="a55c698e2bf5fc3e1b26322a88b80207", 0x24, r3}) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7003, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "00000000000000000000000000000006", "20040100"}, 0x28) 22:19:02 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x40042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x1804, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) sendfile(r3, r4, 0x0, 0x100000001) 22:19:02 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x1c200, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r2) r5 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x5b, "381ecfdba38b86e0981e3febb6c5d460f2f468ad3f0d52a54ad3b065581c635889ce22c1d935b20156586eb692358444776714eeb817c42ea0cf9bca9c1398474ab8ad2081512acf0b40df82f2ac23ad903863ae9569e71289ef01"}, &(0x7f0000000140)=0x63) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f00000001c0)={r6, 0x6}, 0x8) [ 2368.589245][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x1}, 0x16, 0x3) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @local}, 0x1c) [ 2368.688444][ T28] audit: type=1804 audit(1578781142.192:441): pid=7705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2334/bus" dev="sda1" ino=17275 res=1 [ 2368.858195][ T28] audit: type=1804 audit(1578781142.362:442): pid=7122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4048/bus" dev="sda1" ino=17009 res=1 22:19:02 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000300)={0x6, 0x45, 0x3ff, 0x1, 0x43}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x412080, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000040)={0x45, 0x29, 0x2, {0x200, [{{0x0, 0x2, 0x7}, 0x7, 0x3, 0x5, './bus'}, {{0x40, 0x1, 0x6}, 0x4, 0x81, 0x5, './bus'}]}}, 0x45) ftruncate(r0, 0x800000000088001) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4e68d5f8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getlink={0x30, 0x12, 0x10, 0x70bd25, 0x25dfdbff, {0x0, 0x0, 0x0, r5, 0x4000, 0x25920}, [@IFLA_PROMISCUITY={0x8, 0x1e, 0x2}, @IFLA_TXQLEN={0x8, 0xd, 0xa5d1}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000001}, 0x8002) 22:19:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', "20040100"}, 0x28) 22:19:02 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r6 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000000)=@req={0x1a, 0x1ff}, 0x10) r7 = accept$netrom(r6, &(0x7f00000000c0)={{}, [@bcast, @rose, @netrom, @default, @netrom, @remote, @default]}, &(0x7f0000000000)=0xffffffffffffff0a) ioctl$SIOCNRDECOBS(r7, 0x89e2) dup2(r0, r1) 22:19:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000040)) 22:19:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7004, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/80, 0x50) getdents64(r0, &(0x7f0000000700)=""/66, 0x42) getdents64(r0, 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r4, 0x10, &(0x7f0000000580)={0x0, 0x0}) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r6, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd39787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe634561136eb9c8bfa423338f22b869777f875e0c55742fccac1f22075efe2209aeac0b9cd9e95f158faef38be4b", @ANYRES16, @ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r2], 0x6, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r7}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r5, r6, 0x0, 0x1, &(0x7f0000000080)='\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0, r7}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r2, r1, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r7}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r7}, 0xfffffe83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x6, &(0x7f0000000000)='loem0\x00', r7}, 0x30) pidfd_open(r8, 0x0) r9 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x88001) r10 = socket(0x11, 0x3, 0x0) bind(r10, &(0x7f0000000180)=@isdn={0x22, 0xa1, 0x3, 0x6c}, 0xfffffffffffffeee) r11 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r10, r11, 0x0, 0x4e68d5f8) [ 2369.111674][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:02 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000200)=""/4096) ftruncate(r0, 0x88001) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000000)={0x56}) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000001200)={0x9, 0x0, [{0x80000000, 0x0, 0x82, 0x5, 0x5}, {0x40000001, 0x20, 0x9, 0x303, 0xfff}, {0x80000000, 0x5, 0x0, 0xac, 0xffffffff}, {0x80000001, 0x1, 0x7, 0x8, 0xb1c}, {0x6, 0x401, 0x9, 0x1, 0x7}, {0xb, 0x7, 0x1f, 0x9, 0x8}, {0x7, 0x401, 0x0, 0x80000001, 0x7}, {0xc0000000, 0xaa71, 0x1ff, 0x0, 0xdc}, {0xb, 0x6, 0x0, 0x3, 0x7}]}) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:19:02 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r5, 0x0, 0xffffffffffffffff, r4) syz_open_procfs(r5, &(0x7f0000000080)='net/ip_mr_vif\x00') r6 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r1) 22:19:02 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000000)) 22:19:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b', "20040100"}, 0x28) 22:19:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7005, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2369.423716][ T28] audit: type=1804 audit(1578781142.932:443): pid=8435 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4050/bus" dev="sda1" ino=17025 res=1 22:19:03 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, r1) r5 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r5, 0x110, 0x4, &(0x7f00000000c0), 0x4) [ 2369.586395][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2369.684179][ T28] audit: type=1804 audit(1578781143.192:444): pid=8435 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4050/bus" dev="sda1" ino=17025 res=1 22:19:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000100)={0x0, 0x8, 0x4, 0x4000, 0xcb61d36, {0x77359400}, {0x3, 0x8, 0x8, 0x19, 0x1, 0x9, "b36225fc"}, 0xa36, 0x1, @offset=0x4, 0x80000001, 0x0, r1}) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) sendmmsg(r2, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) alarm(0x3) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x7ff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:03 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x80000) ioctl$TCGETS(r2, 0x5401, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f0000000000)='/dev/media#\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r1) 22:19:03 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x6) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', "20040100"}, 0x28) 22:19:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:03 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) r4 = openat(r3, &(0x7f0000000200)='./bus\x00', 0x0, 0x2) fanotify_mark(r2, 0xd1, 0x0, r4, &(0x7f0000000240)='./bus/file0\x00') socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) dup3(r5, 0xffffffffffffffff, 0x80000) r6 = accept4$rose(0xffffffffffffffff, &(0x7f0000000000)=@short={0xb, @dev, @default, 0x1, @null}, &(0x7f0000000080)=0x1c, 0x80000) getsockopt$sock_buf(r6, 0x1, 0x1c, &(0x7f0000000100)=""/37, &(0x7f0000000140)=0x25) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r7 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r7, 0x0, 0x4e68d5f8) 22:19:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x406, r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2370.112055][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:03 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000200)={0x1, 0x8, 0x4, 0xfffffffffffffff9, 0xe803, 0x2, 0x2a, 0x101, 0x0, 0x6, 0x6, 0x3}) r2 = socket(0x11, 0x3, 0x0) syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x57, 0x4) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket(0x11, 0x3, 0x0) r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @window={0x3, 0x800, 0x6}, @mss={0x2, 0x4}], 0x3) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) inotify_add_watch(r5, &(0x7f0000000140)='./bus\x00', 0x1c) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) accept$alg(r3, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r6, 0x0, 0x4e68d5f8) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000002c0)={0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}, @rc={0x1f, {0x2, 0x4, 0x16, 0x4, 0x60, 0xfe}, 0xf2}, @nfc={0x27, 0x1, 0x2, 0x6}, 0x7d, 0x0, 0x0, 0x0, 0x80, &(0x7f0000000100)='ip6gre0\x00', 0x0, 0x7, 0x800}) 22:19:03 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0xc8000) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r0, r1) 22:19:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "00000000000000000000000000000010", "20040100"}, 0x28) 22:19:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x8912, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:03 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x800) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@ipv4_newroute={0x2c, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_PREFSRC={0x8, 0x7, @broadcast}, @RTA_OIF={0x8, 0x4, r3}]}, 0x2c}}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0x33}, @ipv4={[], [], @local}, @local, 0x0, 0x0, 0x4, 0x700, 0xad, 0x20000, r3}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r4, 0xe09, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x440}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x200, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) r5 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r5, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:04 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x7f, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r4, 0x80984120, &(0x7f0000000080)) r5 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) [ 2370.491956][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:04 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0xb9eba1560b5c2c1d, 0x0) connect$caif(r1, &(0x7f0000000040)=@dgm={0x25, 0x3b06, 0x8}, 0x18) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$void(r4, 0x5450) sendfile(r2, r3, 0x0, 0x4e68d5f8) getsockopt$inet_dccp_int(r2, 0x21, 0x10, &(0x7f0000000080), &(0x7f0000000100)=0x4) io_setup(0xfffff5c9, &(0x7f0000000140)=0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) r7 = openat(r0, &(0x7f0000000340)='./bus\x00', 0x400000, 0x2c) getsockopt$CAN_RAW_RECV_OWN_MSGS(r7, 0x65, 0x4, &(0x7f0000000380), &(0x7f00000003c0)=0x4) io_cancel(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x3, r6, &(0x7f0000000200)="bac715886d64f567b292636a2cdc0f2cf10fa40f0e507f0a4a94ead6a993b395504c0dba42ff22365a0be5051828d4cf9dd24da706d3d2d201658e4b5b1bd25ea8f6de4fb01327ade137a41de7d30d87d0c77d18e27b4729700447114131c8039e3db17712318e0f7cf704d91919a372823df59ed52a8b98a1f525d37592cb17671f06e6e463215f469d9cb4e4087df55dc377ff6d60", 0x96, 0xffffffffffffffff, 0x0, 0x7}, &(0x7f0000000300)) 22:19:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:04 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000000)="d1e497f7c84eabd7f36c5f7ae3031645b55245b0ce412700d5953f3590f12f5bc84e3aecdd35ec4e83dc7072701cb877e820f7f61cfad2c884ca60e2431ef11306e743a2b0804971d8cd067a6e7c728df05f164f020d44a51550db1aab710e50b8ba26ceced247af4798cb59195835bb48bf11798fd779b7caf29a790ffe2cffa6eb652dee09581dd9", 0x89, r3}, 0x68) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x58080280}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r4, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4040000) 22:19:04 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) poll(&(0x7f0000000080)=[{r5, 0x10184}, {r4, 0x5090}, {r6, 0x8004}, {r4, 0x2031}, {r0, 0x2033}], 0x5, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fa1bcbadf9d826bddbbb000000000000000000", 0x14}], 0x1}}, {{0x0, 0x0, 0x0, 0x2d}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2370.882895][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:04 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0xe84b9c5cf7902b25, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x6, 0x8) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x8933, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:04 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:04 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2) r1 = socket(0x11, 0x2, 0xfe) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_MULTICAST_ROUTER={0x8, 0x22}]}}}]}, 0x44}}, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/48, 0x45b) getdents64(r5, 0x0, 0xed) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r6, 0x40084149, &(0x7f0000000280)=0xb78) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r7, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f0000000040)={0x8d71732fb617934, 0x0, 0x2, r7, 0x0, &(0x7f0000000000)={0x0, 0xa39, [], @value64=0x80000001}}) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000080)={0x4210, 0xfc1, 0x43, &(0x7f0000000100)="dcd6f0351ff775fac7ce3d5b71f8909b5b0740b1328925d44f18946f11becbf130bde4b40c1a2531cd0df96d0a93deafb2c41ffd8dc4cc6eaecbe723786ef6b832a05b"}) r9 = socket$netlink(0x10, 0x3, 0xc) writev(r9, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x800, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 22:19:04 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x382001, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000040)=0x6) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) r4 = gettid() r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r7 = accept4$bt_l2cap(r6, &(0x7f0000000100), &(0x7f0000000140)=0x34b, 0x80000) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r8, 0x10f, 0x80, &(0x7f0000000040), 0x4) sendfile(r7, r8, &(0x7f0000000200)=0x81, 0x8) r9 = getpid() socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r10, 0x10f, 0x80, &(0x7f0000000040), 0x4) signalfd(r10, &(0x7f0000000240)={0x8000}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r9, 0x0, 0xffffffffffffffff, r5) tgkill(r4, r9, 0x23) 22:19:04 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000080)={0x3, 0x5}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) [ 2371.262221][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x8982, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x10) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000100)=0x79c7, 0x12) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x6c953ae9926d8213) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000280)={0x5fffffff, 0x1, 0xff1f, 0x2000000, 0x6, {}, {0x2, 0x8, 0x5, 0x80, 0x0, 0x7}, 0xffffffff, 0x1, @userptr=0x10000000005, 0x1000, 0x0, r3}) ioctl$SG_GET_COMMAND_Q(r4, 0x2270, &(0x7f0000000140)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000040)={0x1e3b0000, 0x80000000, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x24096e, 0x5, [], @ptr=0x200}}) ioctl$VIDIOC_S_PRIORITY(r5, 0x40045644, 0x2) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e24, 0x3, @remote, 0x1000}, 0x1c) 22:19:05 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)={0x5, [0x4, 0x7f, 0x400, 0x6, 0x0]}, 0xe) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r3 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000080)=""/80, 0x50) getdents64(r7, &(0x7f0000000700)=""/66, 0x42) getdents64(r7, 0x0, 0x0) ioctl$VIDIOC_G_CROP(r7, 0xc014563b, &(0x7f0000000100)={0xa, {0x4, 0x400, 0x1000, 0x8}}) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) dup2(r2, r3) 22:19:05 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) getsockname(r2, &(0x7f0000000000)=@ethernet={0x0, @broadcast}, &(0x7f0000000080)=0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:19:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:05 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000040)={0x9, {0x8000, 0x8, 0xfffffff7, 0x6}}) ftruncate(r0, 0x88001) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x55) sendfile(r2, r3, 0x0, 0x4e68d5f8) ioctl$USBDEVFS_SETINTERFACE(r3, 0x80085504, &(0x7f0000000000)={0x809, 0x4}) 22:19:05 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r5, 0x4004ae8b, &(0x7f00000001c0)={0x7d, "c9de8bef137b102b92061ebdb8c36e3b683a4cf8285c9b6095b7a449096f368f5661388f829be16fa9edb8918f51153a5e12d3442953e1fc33a509ea48d685afc645e56574571580c1274483011d55fb40a4cd80198695ad56f3b97c900d6d527fa68ea8fc982259c0c226ea947b0ce06f82e9af8da1ce1736f8a0442a"}) dup2(r0, r1) 22:19:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0xfffffffc, @loopback}, 0xffffffffffffffc7) sendmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x29c, &(0x7f0000000180)}}, {{0x0, 0x47c, 0x0, 0xfffffc8f, 0x0, 0xfffffe10}}, {{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @empty}, 0x2, 0x2}}, 0x0, &(0x7f0000000240)=[{&(0x7f00000001c0)="dadfde0784bf5ed81cc609d216e4572e2139e4ce3fd71702c2372dcbc99cdfd3de83f1d85e96d66daf72c284429efd45571fc1cf"}, {&(0x7f0000000200)="ea93c1a54a226ccd233a46ec4aaf1dc0bd4992aca3f09561b757fb4540b1bee0ff9c"}], 0x0, &(0x7f0000000280)=[{0x0, 0x1fc, 0x4a, "c8aad050e1046c1a55d9fec3e3e0a038a9fb439e5f2d59b0da3880968df676daa177ac90a659cbeed5355eeaac88d62fa702f30f86e2164806d4be3301cd81760d23795c0e699c2e1e9bb41129d8e381b105a06c48b433a954f49e68b793c01ce998323db8437ddacf88da45f5660927e97d1176ec5ac946f3ce3cb063630c2e09f032"}, {0x0, 0xad3ac1d3b83adf18, 0x1, "22f7995ea6fa1e514f0d6a949b78adafc15babe011f57ae82055bf80544ffdcc793f56bc24b6d47ac959955dfef3073791e8e3a7e6b1b6c9da5a0b6bc62bc83f0c3310f3178220e8904d456e9fa688f9b00977cef68b3a6688f26348a6f1"}, {0x0, 0x0, 0x8, "acebf054bb90a23a58388ae8eaabda75d3a555cf2682cc358b653508e9d2b9ffa6e3fe55cd8df984dc33670492eead685c02588ae88c286f6e594b"}, {0x0, 0x116, 0x81, "211a71bf6e2e"}]}}], 0x2, 0x0) fcntl$notify(r0, 0x402, 0x2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xae01, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:05 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) bind(0xffffffffffffffff, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x4e68d5f8) [ 2372.177051][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 2372.177067][ T28] audit: type=1804 audit(1578781145.682:456): pid=10777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4055/bus" dev="sda1" ino=17247 res=1 22:19:05 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:05 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000080)={0xa30000, 0x0, 0x20, r3, 0x0, &(0x7f0000000040)={0x9909cd, 0xff, [], @p_u32=&(0x7f0000000000)=0xffff}}) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x4e68d5f8) 22:19:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x400454ca, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:05 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001740)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001780)={0x14, r4, 0x1}, 0x14}}, 0x0) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x442, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000910}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x48, r4, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r5}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xdc}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6_vti0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x4004040) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r6) r9 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r9, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(r9, 0x0, 0x488, &(0x7f0000000240)={{0x2c, @loopback, 0x4e24, 0x2, 'rr\x00', 0x9, 0xc4b0, 0x6c}, {@remote, 0x4e21, 0x10000, 0x0, 0x4}}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup2(r0, r1) r10 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r10, &(0x7f0000000080)=""/80, 0x50) getdents64(r10, &(0x7f0000000700)=""/66, 0x42) getdents64(r10, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_DRAIN(r10, 0x4144, 0x0) [ 2372.348071][ T28] audit: type=1804 audit(1578781145.852:457): pid=11146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2340/bus" dev="sda1" ino=17062 res=1 22:19:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:06 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x8001004, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x11, 0x3, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x5, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f00000001c0)=@req3={0xffffffe1, 0x0, 0x95c, 0x7ff, 0x5, 0x1, 0x80}, 0x19) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000100)=@req3={0x1, 0xfff, 0x4, 0x1, 0x3f, 0xff, 0x6322cce8}, 0x1c) r6 = dup2(r3, r2) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000080)=""/80, 0x50) getdents64(r7, &(0x7f0000000700)=""/66, 0x42) getdents64(r7, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r7, 0x4004af61, &(0x7f0000000080)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r1) [ 2372.598321][ T28] audit: type=1804 audit(1578781146.102:458): pid=11370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4056/bus" dev="sda1" ino=17425 res=1 22:19:06 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x8000082}, 0x17) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x5}, 0x10) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2372.648765][ C1] net_ratelimit: 3 callbacks suppressed [ 2372.648776][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:06 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x9) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000280)={&(0x7f0000000080), 0x10, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="0400000042000000ff00000000000000", @ANYRES64=0x0, @ANYRES64=0x7530, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="02000040010000000200002000035b972a0d1ba9"], 0x48}, 0x1, 0x0, 0x0, 0x801}, 0x1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) removexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@random={'os2.', '-em0posix_acl_access\x00'}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r2, 0x8983, &(0x7f0000000000)={0x8, 'nr0\x00', {'veth1_to_bond\x00'}, 0x8}) [ 2372.738649][ T28] audit: type=1804 audit(1578781146.242:459): pid=11370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4056/bus" dev="sda1" ino=17425 res=1 22:19:06 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r3) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r5, 0x5646, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000080)=""/80, 0x50) getdents64(r7, &(0x7f0000000700)=""/66, 0x42) getdents64(r7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x780) dup2(r0, r1) 22:19:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:06 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sched_setparam(0xffffffffffffffff, &(0x7f0000000000)=0x5d8d) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40049409, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2372.890325][ T28] audit: type=1804 audit(1578781146.392:460): pid=11726 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2341/bus" dev="sda1" ino=17065 res=1 [ 2373.050173][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:06 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0xe) r5 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 22:19:06 executing program 5: r0 = socket$inet6(0xa, 0x9, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2373.166756][ T28] audit: type=1804 audit(1578781146.672:461): pid=12111 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4057/bus" dev="sda1" ino=16884 res=1 22:19:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:06 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={r4, 0x1b50}, &(0x7f0000000040)=0x8) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x4e68d5f8) 22:19:06 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ftruncate(r1, 0x100000001) ftruncate(r0, 0x88001) r2 = socket(0x11, 0x3, 0x0) r3 = accept$netrom(r0, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)={'erspan0\x00', 0x5}) bind(r3, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x4e68d5f8) [ 2373.254890][ T28] audit: type=1804 audit(1578781146.712:462): pid=12219 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4057/bus" dev="sda1" ino=16884 res=1 22:19:06 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f0000000080)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 22:19:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4008700c, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2373.386573][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2373.503784][ T28] audit: type=1804 audit(1578781147.012:463): pid=12273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2342/bus" dev="sda1" ino=17185 res=1 22:19:07 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_init_net_socket$rose(0xb, 0x5, 0x0) getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000080)=0x1) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) r5 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x383, &(0x7f0000000440)=[@in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, @in6={0xa, 0x4e21, 0xea, @remote, 0x5fba}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000400)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x21, 0x200, 0x7, 0x7, 0x80, 0xff, 0x4, r7}, &(0x7f0000000280)=0x20) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f00000002c0)={r8, @in={{0x2, 0x4e22, @local}}}, 0x84) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r12 = syz_open_procfs(0x0, &(0x7f0000000380)='net/dev_snmp6\x00') getdents64(r12, &(0x7f0000000080)=""/80, 0x50) getdents64(r12, &(0x7f0000000700)=""/66, 0x42) getdents64(r12, 0x0, 0x0) getdents64(r12, &(0x7f00000001c0)=""/94, 0xffffffffffffff05) getdents64(r11, &(0x7f0000000700)=""/66, 0x42) getdents64(r11, 0x0, 0x0) ioctl$SCSI_IOCTL_SYNC(r11, 0x4) r13 = dup2(r10, r9) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) dup2(r0, r1) 22:19:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2373.641846][ T28] audit: type=1804 audit(1578781147.112:464): pid=12373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4058/bus" dev="sda1" ino=17066 res=1 22:19:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000a640)=[{{&(0x7f0000001280)=@caif=@util={0x25, "c9d64d7d7e23e15b5bf2ed98f18528fa"}, 0x80, &(0x7f0000003800)=[{&(0x7f0000001300)="62e5584102612450c6457129ad22f832275d16795ce7a47b059d78668df883c9f1d1835b540b000b184e52c9bc30a4c96af2e18abe8edeebbde843298db7237eb9acbf4ae914f45bf78e7e8b6300fef3dca30bc78828e702038f0ab3e1a8d044912c774fe6b83d8f1bd92426ebbd675326304b9d65139d70f81c93ac7e23f320c1a865ef04196733c8992563378c1646bdcbec2c212445be087be59c30b88b33851e668f92da06315a0e6328697a34e7d785d1489909661ac0446a9e49cc83cc6c8e28cf09160c0e9f5abb0e4d21ed9bf16bab7e28681138a419ec54b4f37cefb30a5358", 0xe4}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000002400)="07f34203347496c029f602d2653fceb3d618d5bd1a3eb14b4f79426fa29ed43ac03b961b78270091f1ade2bdf0166113850344d2abf253e3bc383cb227408dd3ea6f3daf74140fbbdf0a5177d3ecc02865906549fdbe1cc81f87d2def8acf832dec6ba8428846cca280340011e82bcad34a607af5b0c6dcde1fcfa588b795a53348ae5fcce1f8c", 0x87}, {&(0x7f00000001c0)="499a71afa2f0e11a92724a24129e5c28f1d6cd2c9df992f51b0bd7", 0x1b}, {&(0x7f00000024c0)="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", 0x1000}, {&(0x7f00000034c0)="79522502e93a5afa7308ac76", 0xc}, {&(0x7f0000003500)="0cbfac7a527bfcba275d679c12b5bd7ce5a0c3b1cdb7f7a119a8037df16331ae01e70ec4856e19ca4702b7a6426f19834be9252dc521091dc7e5fa56ba2b15751fec061588c64b2dbf43f0fc84785e0c79a86dd61ca8fe2e48653dff141763779ad10fbf4b78cc9eded2185e7fab416c8de66fdc86902bb90c1e55d96611c3eeeb3c17797ab791e1ca2fbd44475e", 0x8e}, {&(0x7f00000035c0)="5babeeac87b45d7305af3ff408b982638a508ebbceb07b999de3c0e59e43e8fdf53f94946b16b102ca5d329d58d6c3b7be9f0ec9d218a1ceee4b0752b7e4129afa1185dd14f75726840e42d621caa542f8e5d2c643f6badde702c360d63479ee6a92bd6b16aed0d7831f4625b6647aa16916260f17595c591a83c70d988232f0cde76141dc2e1eb9a384e8627910de2e0480f9fe7bb6b2ff6de73ccbd4db695baa", 0xa1}, {&(0x7f0000003680)="72e927cdfc27f9fac241474b5099f0fb24e3c76cca6db606aff91037d78ab61e2747a31e3d288aadcdc5ae0dba81ddd970e43125635ef40aad61670aae9c530146e4a88089c0b67d8be943d037a448a66edc65fe6053a0c40de24d58619fa0cad2fb693c77d0eefe8ddf31dd15d9ae173f0850feb89148cd6a2ec4ce02b8d9286657ca1f0f39e0e265e4e746547e49fde92d2399513a9421fe2826014d523f05275ade7e717a83288571a417857966a9d07a3161b7f9dad147d29fb55d8dc7f0d63bb0437bd2dc941900", 0xca}, {&(0x7f0000003780)="771cc91a8e8822b96f215b2994d2e910aaadffc92989a8f91aa15ac1703bb4b8529e7bffce5a0b721de6ff0c3bfd42ba5e599d81cc572087f404cc40abff614f73ac16c0b29175e9b7f5743f4d4ec09e769bd9357fde3a7576e3f9923d06cfe451dc311be26f0086", 0x68}], 0xa, &(0x7f00000038c0)=[{0x60, 0x116, 0x2d7959e7, "573c5b624f197221c21a112cab372f0326970e352df564696ab08ba34af9b70ecbd98301395e7628661600baad2d7455665d9a58d94aecf556156e50b53bb8a56031e1c995dec10451f504359c386d"}, {0xf0, 0x10f, 0x6, "29a23a42ef2ba0a6e5ed136318c7cdf79708240d3cb5c1e257841200c37325ed5e2dee3610f7eee28ac9362a06eb4996a152d54e263bb87bd701fec143fc0b87dfcc905280eb0c7a31ec4b91881e7480186bf877f3016d593ed40a35c53d2fb27357f4de19b4f307c9b17df6288d249c933baa3f234a54da01b99969f30ddec3c5908a149430ddacd9baeeb7d6c585b33392d9f8be3c847c7bc42ed4b74593b9603a9c13856e3db4504978afcfc96ac94b83116ac165ac2433a5b60dfaed3d94ac42de28d33029c568de5a85c7e6608e4d77f86eb8afbdbdc5ea"}], 0x150}}, {{0x0, 0x0, &(0x7f0000003b00)=[{&(0x7f0000003a40)="aeba1ef8d5b722232b0ca8135a27c5663b4794b31430c353c199eb773231c24a369e84bf5defeb437567a2a971ffd773b68fa19a968fefad8832457502b9929ff201449cde2bb44fc2896128d9728a64", 0x50}, {&(0x7f0000003ac0)="a7c858c459114e9838e2df14afed6b71e487061e1e60bf4853408dfaf5b50266e28d150d0ba358ee99e4c824", 0x2c}], 0x2, &(0x7f0000003b40)=[{0x1010, 0x1, 0x3ff, "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"}, {0x1010, 0x10d, 0x8000, "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"}, {0x98, 0x84, 0x8bf, "fe717a9aafbec89e5d2b62a31d38dac0633367eda3230fadf0c40f19996a81852454bdfe58aa8883c0a8281a54523b552ac5b4459837e9de2271f5cce9ed976f4a4945a11c68af6b61e10ae5022bcf10a1ba5d436af3f2aa2308a187602a6dcbe0adcf2cf3ff5101b21233388fe02ccbb123203dc04d07088cb75a782e0fecc4571a"}, {0x1010, 0x10c, 0x10000, "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"}], 0x30c8}}, {{&(0x7f0000006c40)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'team0\x00'}}, 0x80, &(0x7f0000008000)=[{&(0x7f0000006cc0)="c8b305d5e6c2", 0x6}, {&(0x7f0000006d00)="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", 0x1000}, {&(0x7f0000007d00)="94ef3a45122e0ac23f3f4858fd4be5843af3d101d7c1d653d00e00b623904630ceb07cf4dd3f010d1503b92bd9ff6399a170d1fa15b83c", 0x37}, {&(0x7f0000007d40)="1ee79ca8e2101d1acbcac97e60fc1612798d71a857e0e295271d3db28cf606a6374c1dd00717a6383f2a0671f23845d0f2327013259de50ed1562b645324f28e4ec8c8de764c93bf534fa1a9b89c9fb5e5523bff57acd3dd81fa68bfa0de86ee3527b74bdb5b1cd3d7e1408a68cf485cd2728e27f87c212bedef6ec4ea798f96127384526cc6fe53e92badd869745e054a5ccfb3177352a56799b5554382d0b0d4226cf0eb005bce531e26b0d7a10530b2b68f1c6388e57fe23a961a20e8dbe90b92ce44ef13e73c40d5d6ecba3469d773a44a64338ae40fbb46247e36ad08ba510777058c4da10e49814d9246841aa4e6c3", 0xf2}, {&(0x7f0000007e40)="80c75d8607be4613f99be08587a4d0dfae16f239e0c6abe1ff094cc9405ead2a52958b046e0552177b6d688226f72e1299c740403b69709cf7e14901048e8e53608eda9a9ee15fc520737f7d8ef3830355e2f592584e86528181fe7977af84ee89adefadc45d79b9c49b71a87977f91e50498f8bbb73789391d3d7c50ba6b690a755b670c11f92dd817ae040e1fad4d8239c", 0x92}, {&(0x7f0000007f00)="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", 0xfc}], 0x6, &(0x7f0000008080)=[{0x108, 0x103, 0x8, "1f71bd326dd65560ac77c4ca39a2ceb50dd642fc3a4130c01d22dc24c5e79da8ba8c748ac0ad1c81c9360339b7696113d4b4c07bfd44f8278cf52a1c140a046964d35444c6ae4762914809d25fe207abe82546590e3746ab76c367fd2e08597fe9271b1ff12598d272410b60df3c1ac82cd0d24d21eeb3f5ef42d9130f941bfef4d7ba2eb4492beca2d725a7136bb226849660794a492f6c283885b26057b3e8e63dc9cefd15f596d3bd1c100cbe3885fd2b545bd71a90aa44c4de11eca6730d2754868097128dbef1dc08bba9b44f266d053397fe94b652f28a9dc03de044c34ae42a97a8e8bfc95938e3375a3bf6483469a241"}, {0x20, 0x117, 0x7, "b271300d5c107a33c3d6f7323da2ce"}, {0x10, 0x111, 0xa0}, {0x1010, 0x29, 0x3, "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"}], 0x1148}}, {{&(0x7f0000009200)=@nfc_llcp={0x27, 0x40, 0x2, 0x4, 0x4, 0xca, "66eedee6653ee47022f39fa382c069cbfee3d11b58a7765b6f0e0456ba6377a8552d329c61d7e41d36deea3ff090d34a954bc93b1bcf66600680baeab2d25b", 0x27}, 0x80, &(0x7f000000a500)=[{&(0x7f0000009280)="e7ce7c671222b97cf0d6d1798a9efbef6f1f52280b0fab27c9ad9fd6cb2f303f09ffe96144008693adaeeb9d8de22a9dba68ee60cbf2be908f34677b02e992d8912d7071982dfddb43ac58ce4bb843c016d5f7da57c9206e6e663b805f2fea76e8d01b057d12b5f1f90fda7ede0c4dadb44cc1d23100e358aae3136d4408aad60852bed3887083d769ce6047e5771c55194cc7837168e3fc39427a417b01c17e726899deb78d21735a2a3ebb175e3c1dbc12f1fc5df4c5713bde0d766bb675c50022cff919211cfe93ec399b84becde88166bb70dd55ca23657f46fd572f2c3cae7031c41c2d366a30b4fb28e099", 0x1a4}, {&(0x7f0000009380)="4176951edf3d7108ad4b4948c58770c7ed35d3b98b1a7df46ad094c3c6ace7cdc50d39e837711e34496bfdcea50ac2b675beb45a15bdd11b61942756499578658afffeeaa13651a5eedd4874a9b9081c4a96a13ea1148e12b26000239ee95c78ee3e4570d05f5fe59772ac49a7b32b66f940b9449437db7491db9fccead52552f37b17955871097a87405afb77d1784937a6e6a1d6c8b956370e5bfcf0c52a", 0x9f}, {&(0x7f0000009440)="b8dc969b40a16fe9b8e114719c459099ac423a9e09457fc7dc84c79158118ad3ef9411f7ff7df9b0f48327eb9b84d0f5a4c1c6553f64436be9645792ad96e7fa2ba8b623f2bdfe5e04a291623b50e9bf509eec1e1047c885e84edf4f16", 0x5d}, {&(0x7f00000094c0)="26a8a84f7c4b35a9ae97cecbfe095f819075dd1883ab534940c8a6ade6c995769bc1987280bcd8dbf387626a2ea837910b1db952c9c6ab", 0x37}, {&(0x7f0000009500)="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", 0x1000}], 0x5, &(0x7f000000a580)=[{0xc0, 0xf26da43e18d2875e, 0xfff, "4d50bfe900edbe463dbe8b1c0b660a58b1993fdf6d2a990164d5aeb2c1c70d3503b252789feed4bf02e894829eaa67769518d98b133124764e9e2d887c2f3865b63184e02bc1833b18388659a820eb554e53adabf35e81b2c49d154a54eb581b51c1efca4b39467c244d8148dee7c31cf25ac39f960872eeb745d6e80b4679869062b2be033c14390a56ff5f9a481988e12fe4ddef6ed7bb1213b0d619a8bdf9157c94c9ae716991ede97e0f974e"}], 0xc0}}], 0x4, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:07 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x80) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000000000)='./bus\x00', 0x20000, 0x4) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2373.729968][T12714] sctp: [Deprecated]: syz-executor.4 (pid 12714) Use of int in max_burst socket option. [ 2373.729968][T12714] Use struct sctp_assoc_value instead 22:19:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4008700e, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2373.865246][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2373.878489][ T28] audit: type=1804 audit(1578781147.382:465): pid=12373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4058/bus" dev="sda1" ino=17066 res=1 22:19:07 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x80002, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f00000000c0)='\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r6, 0x0, 0xffffffffffffffff, r5) sched_setaffinity(r6, 0x8, &(0x7f00000011c0)) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f00000001c0)=""/4096, &(0x7f0000000140)=0x1000) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r7, 0x10f, 0x80, &(0x7f0000000040), 0x4) r8 = dup2(r7, r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURBNDELAY(r8, 0x4008550d, &(0x7f0000000100)) dup2(r0, r1) 22:19:07 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xe) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000100)={0x9c0000, 0x9, 0x3ff, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x4c00ae, 0x5882df88, [], @string=&(0x7f0000000080)=0x20}}) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4, 0xfffffffd, @loopback, 0x1}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:07 executing program 4: syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000080)={0x6000, 0x7000}) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r6, 0x8008551d, &(0x7f00000001c0)={0xdb62, 0x1c, [{0x7}, {0x8, 0x1}, {0xc, 0x1}, {0x46, 0x1}, {0xb, 0x1}, {0x3, 0x1}, {0x2}, {}, {0x5}, {0x9}, {0xf}, {0x4}, {0x1, 0x1}, {0xd}, {}, {0xe}, {0x9}, {0x7}, {0xa, 0x1}, {0x6}, {0x8}, {0x2}, {0x4, 0x1}, {0x7, 0x1}, {0x8, 0x1}, {0xd}, {0x7}, {0x4, 0x1}]}) getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000100)=""/127) 22:19:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4008af20, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:07 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendfile(r1, 0xffffffffffffffff, 0x0, 0x4e68d5f8) [ 2374.307117][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:07 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x282840) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000080)={0xa30000, 0x1, 0xff, r4, 0x0, &(0x7f0000000040)={0xa00902, 0x100, [], @value64=0xffffffff00000001}}) ioctl$VIDIOC_DV_TIMINGS_CAP(r5, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @raw_data=[0x3, 0xfffffffb, 0x6, 0x6, 0x0, 0x9, 0x3, 0x7, 0x1, 0x9, 0x2, 0xffff, 0x8, 0x6, 0x5, 0x730, 0x0, 0x8, 0x3, 0x2a60, 0x200, 0xff, 0x8f7, 0x1, 0x8, 0x3, 0x7, 0xffff, 0xfffffffa, 0x9b, 0xffffff39, 0x3]}) r6 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000080)=""/80, 0x50) getdents64(r7, &(0x7f0000000700)=""/66, 0x42) getdents64(r7, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x1, 0xb, 0x1, 0x2f, 0x0, 0x387, 0x2000, 0x78cd788a308d22b1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x80000000, 0x0, 0x3, 0x1000000000000, 0x401, 0x4}, 0x0, 0xe, r7, 0x7) r8 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r8, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockname$ax25(r8, &(0x7f0000000280)={{0x3, @netrom}, [@default, @remote, @default, @remote, @default, @rose, @default, @bcast]}, &(0x7f0000000140)=0x48) dup2(r0, r1) 22:19:08 executing program 5: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000300)={0x7, 0x55406dc1e646f960, 0x8, 0x8, 0x5}, 0xc) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB="7f454c4609f807ff080000000000000001003e00040000003d030000000000004000000000000000920200000000000000000080e30038000100080002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e7bc774578627b28e2eb5e7fcdab37d69d5e40729410625eda134c308e70e6c2dc8d444fa63b8f2d122abedeb9b59a54e0a06a600d12c19f8545f5eb12dbc59f7918c792a1fd9d81983ea9f622fbd180cfbe3c69d5ad8e091b5886"], 0x340) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000), &(0x7f00000001c0)=0xe) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000003c0)={{0x86, 0x1, 0x1, 0xd, 0x4, 0x3}, 0x0, 0x2, 0x5, 0x4, 0x400, "6171e0ee294ebffb4e2bc7c278e783a896d44e51d0458919a6cd0ec80a567c31f01307848e345858b0f114a67e240a46ad6a0d663914b68364346a83c44ce62eeed99d21f485c3765ab3a54082de8e649bf19af1d2268598959c3c35d6276a85c9402e73836ea682d2509fe7e6aa1c053c788a2398f122fd9ecf6f24a276b2e4"}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000340), &(0x7f0000000380)=0x4) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000100)) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r5, 0x40505331, &(0x7f0000000280)={{0x3f, 0x3f}, {0x0, 0xff}, 0x7ff, 0x4, 0x4}) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r7, 0x0, 0xffffffffffffffff, r6) ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f0000000480)={0x1, 0x8000, {r7}, {0xee01}, 0x3}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:08 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000100)) ftruncate(r0, 0x88001) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000000)={0x7, 0x100000001, 0x9}) [ 2374.641159][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:08 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r2) dup2(r0, r1) 22:19:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4010641a, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:08 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:08 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) fgetxattr(r0, &(0x7f0000000000)=@random={'user.', '{\x00'}, &(0x7f0000000040)=""/76, 0x4c) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:08 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000080)={0x9, @pix_mp={0x8, 0x0, 0x20303159, 0x7, 0xb, [{0x100, 0x3ff}, {0x0, 0x4}, {0x5}, {0x8, 0x10000}, {0x20, 0x2}, {0x81, 0x7fff}, {0x1, 0x2}, {0x1000, 0xffffffff}], 0x1, 0x7, 0x1, 0x3, 0x6}}) dup2(r0, r1) [ 2374.943501][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:08 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x6003, @loopback}, 0xffffffffffffffe0) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:08 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x140000, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000140)={0x0, &(0x7f00000000c0), 0xd, r3, 0x1}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r1) 22:19:08 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r4, 0x0, 0xffffffffffffffff, r3) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000200)={{0x9, 0x1, 0x3, 0x6, 'syz0\x00', 0x3}, 0x0, 0x2, 0x10001, r4, 0x5, 0x0, 'syz1\x00', &(0x7f0000000040)=['\x00', '\x00', ')ppp1.em0\x00', '\x00', '\x00'], 0xe, [], [0x6, 0x8, 0x40, 0xfff]}) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40186366, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:08 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000080)={'syz1', "8b33831038d181864a3718ee53109e9316af67d393f6a469b3f5c40a65ae56a82e693308c41f9d35cd27eee42cc8ef6e947ec2cb90c3cce37b404c08d815537899f55e48d2163e4a7c82fbad6f3817c18efbc7353d8d8a8027cf543bbe253ffa3cde92f3899f1a9a32"}, 0x6d) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:08 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x29}}, 0x5}, @in6={0xa, 0x4e24, 0x80000001, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8}, @in={0x2, 0x4e20, @broadcast}], 0x48) [ 2375.374103][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:08 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f0000000000)={0xf768996fbdc1f5cb, 0xce99, 0x8000, 0x145000, r0}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x426080, 0x0) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000140)={0x3, 0x1, 0x17, 0x1e, 0xd3, &(0x7f0000000200)}) 22:19:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:09 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getcwd(&(0x7f0000000200)=""/4096, 0x1000) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8439dff6f7366b3c}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x3, 0x1, 0x310, 0x70bd28, 0x25dfdbfe, {0x1, 0x0, 0x6}, [@CTA_TUPLE_REPLY={0x10, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x88}}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) 22:19:09 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x80000000, 0x3ba753a4e9cc9fce) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:09 executing program 5: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x401, 0x6}, 0xc) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x42100, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000380)={{0x0, 0x0, 0x80}}) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x6, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={r4, 0x1}, 0x8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x7}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r5, 0x8983, &(0x7f0000000100)={0x1, 'veth0_to_team\x00', {}, 0x6}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2375.690328][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4020940d, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:09 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80000, 0x0) write$FUSE_WRITE(r4, &(0x7f00000000c0)={0x18, 0x0, 0x6, {0xea34}}, 0x18) r5 = socket(0x1f, 0x5, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES32=r8, @ANYBLOB="030006000600810005000700e6ff81ff"], 0x14) r9 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) dup2(r0, r1) 22:19:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:09 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000000), 0x4) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ffff7f0000c6055cd7fbdec800000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x3fb) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) setsockopt$sock_timeval(r4, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) 22:19:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4e68d5f8) 22:19:09 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x400027c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:09 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) [ 2376.246849][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:09 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc0801}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x34, r1, 0x10, 0x70bd29, 0x25dfdbfc, {{}, {}, {0x18, 0x17, {0x18, 0x0, @l2={'eth', 0x3a, 'syz_tun\x00'}}}}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x800) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$bt_BT_VOICE(r4, 0x112, 0xb, &(0x7f0000000200)=0x60, 0x2) 22:19:10 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000000c0)={0x80000001, 0x8, 0x4, 0x0, 0x8001, {0x0, 0x7530}, {0x5, 0x8, 0xcb, 0x7, 0x9, 0x0, "e9ae8bd9"}, 0x9, 0x1, @planes=&(0x7f0000000080)={0x3ffc, 0x7fffffff, @mem_offset=0xfffffeff, 0xffff9b99}, 0x7, 0x0, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0xe09, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000008}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x400000}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffff, 0x1901) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f00000002c0)={0x17, 0x34, 0xd, 0x11, 0x0, 0x8, 0x3, 0x123}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, r1) 22:19:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:10 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @dev={0xfe, 0x80, [], 0x55}}, {0xa, 0x4e21, 0x20, @local}, r5}}, 0xe7) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self\x00', 0xc02042, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9}, 0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f00000002c0)={r9, @in6={{0xa, 0x4e20, 0x0, @rand_addr="0be9d684d890f54bef710fd9fa4910b7", 0x8}}, 0x5, 0xd600, 0x6, 0x1, 0x2, 0xfffffff7, 0xfa}, &(0x7f00000001c0)=0x9c) 22:19:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4024700a, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:10 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4008110}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x300, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x200000d0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000240)={0x5, 0x5, 0x4, 0x20000, 0x4000, {0x77359400}, {0x1, 0x0, 0x5f, 0xff, 0x1f, 0x80, "6fea6662"}, 0x200, 0x2, @offset=0x4, 0x1, 0x0, r1}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) setsockopt$inet_sctp_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f00000002c0)={r8, 0x0, 0x6, "067b21747a94"}, 0xe) sendfile(r1, r4, 0x0, 0x4e68d5f8) 22:19:10 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000100)=0x3f, &(0x7f0000000140)=0x1) getdents64(r2, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000080)={0x3, 0x0, 0x2015, 0x1f, 0xc12, 0x1, 0x3ff, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) preadv(r5, &(0x7f0000000240)=[{&(0x7f0000000200)=""/30, 0x1e}], 0x1, 0x10000) getdents64(r4, 0x0, 0x0) ioctl$VIDIOC_S_AUDIO(r4, 0x40345622, &(0x7f00000001c0)={0x6b95, "0daf5ff44dbd316b8e857b6b4f40187bb2b214ae1dff4a2f9dc08614b0a06836", 0x4}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, r1) 22:19:10 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) accept$netrom(r1, &(0x7f0000000040)={{0x3, @null}, [@netrom, @default, @netrom, @null, @default, @null, @null, @netrom]}, &(0x7f00000000c0)=0x48) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40287010, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:10 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x56402, 0xb223e946335a62f0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000000140)='./bus\x00', 0xef9886190213e8e4, 0xd2) sendfile(r1, r2, 0x0, 0x4e68d5f8) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="030310000000cb22009f1f633e340f9ead5e696767eaa0d28d80411dcd5b0b7aa9b1973104e1d8aacaad98ec5d4700032b03f7e23d73c8d00c1601ee330060488004d36d713eda6665041100c36d070d416bc8e92c2b86798bc03601b0cfc8e01967d3e98f6bb20d747c081730c67b3b669dd7a0d4ee722c2262640e4137d178aa7c5f84db8858c9afb412fe62c77487b6b90acac99383506dd78a815442f989d090a5c1a9fd000000"], 0xa9, 0x0) 22:19:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:10 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) syz_open_dev$video4linux(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) socket$caif_seqpacket(0x25, 0x5, 0x1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x80000, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/sequencer2\x00', 0x412400, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) dup2(r4, r3) 22:19:10 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1fb}, 0x10) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0x0, 0x1}, 0x6) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2377.184498][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 2377.184511][ T28] audit: type=1800 audit(1578781150.692:481): pid=15841 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=17071 res=0 22:19:10 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 22:19:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028705d, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:10 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, 0xe, 0x6, 0x200, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x20020011}, 0x0) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x20, r5, 0x401, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xffffffffffffff21, 0x1, 0xffff}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x21c, r5, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x42}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8e82}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x372d}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'nr0\x00'}}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x15}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x27d}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4e}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xed}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x48881}, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x4e68d5f8) 22:19:11 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x40) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, &(0x7f0000000000)={0x6, 0x80}) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x7}}, 0x18) 22:19:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2377.535758][ T28] audit: type=1804 audit(1578781151.022:482): pid=16217 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4066/bus" dev="sda1" ino=17063 res=1 [ 2377.604390][T16221] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2377.659320][ T28] audit: type=1804 audit(1578781151.162:483): pid=16296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4066/bus" dev="sda1" ino=17063 res=1 [ 2377.750362][ C1] net_ratelimit: 2 callbacks suppressed [ 2377.750374][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:11 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x101002) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e20, 0x7, @empty, 0x3ff}, {0xa, 0x4e20, 0x50, @mcast1, 0x5}, 0xf801, [0x1, 0x6, 0x536, 0x8, 0x2, 0xbfc1, 0xfffffffa, 0x101]}, 0x5c) 22:19:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x800454d2, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:11 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/909], 0x38d) msgctl$IPC_STAT(0xffffffffffffffff, 0x2, &(0x7f0000000000)=""/52) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) [ 2378.045227][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2378.194140][ T28] audit: type=1804 audit(1578781151.702:484): pid=16805 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2350/bus" dev="sda1" ino=16690 res=1 22:19:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "000000000000000000000000000000ff", "20040100"}, 0x28) 22:19:11 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vlan1\x00', 0x0}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)={0x184, r6, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x380000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x9, 0x1, @l2={'eth', 0x3a, '\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x8a, @ipv4={[], [], @multicast1}, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x101, @dev={0xfe, 0x80, [], 0x23}, 0x3}}}}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x101}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1e2000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x766c9fa33a35e2e2}, 0x44080) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000801000e004008000e0104000300"], 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x48, r5, 0x104, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @NL80211_ATTR_WIPHY={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4000054) getsockopt$inet6_int(r3, 0x29, 0x19, &(0x7f0000000000), &(0x7f0000000040)=0x4) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x4e68d5f8) r9 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0xfffffffffffffc00, 0xa114c9b162530f92) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r10, &(0x7f0000000200)={0x0, 0xfffffffffffffe5c, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r11, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0xffcd}}, 0x8) sendmsg$FOU_CMD_ADD(r9, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20244000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, r11, 0x400, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x6}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x9bc658041660c428) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000300)) 22:19:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x80086301, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:11 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(r0, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) bind$bt_sco(r1, &(0x7f0000000000)={0x1f, {0x4, 0x3f, 0x7f, 0x1, 0x3f, 0x7}}, 0x8) [ 2378.391319][T16950] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2378.427611][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2378.458589][ T28] audit: type=1804 audit(1578781151.962:485): pid=16950 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4067/bus" dev="sda1" ino=16737 res=1 22:19:12 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x9, 0x8, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2378.647884][T17282] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2378.730092][ T28] audit: type=1804 audit(1578781152.232:486): pid=17352 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2351/bus" dev="sda1" ino=16690 res=1 22:19:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "000000000000000000000000000000ff", "20040100"}, 0x28) 22:19:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x8008700b, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000001640)={r2, r3, 0x8001, 0x58, &(0x7f00000015c0)="2db43cceafb62f22d53af9f768b263b69964c7ddebab886995ae31804fe093d7f7e63fbba67f8d21eabcb32c449b4b294cba37d4eff2b87a8efde0e641699e16a5a7053d1210a99d83a878fa5106ae02c13a1befe43a9186", 0x76, 0x0, 0xfffd, 0x6, 0x8, 0x2, 0x9, 'syz0\x00'}) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000000)="4a05e26137d47ee11890dbe14a8f8a53a323d5f6fdd1eb78725c8a6a573cdce933a018b8071bfbb72736fad0d545a287484638bc91e41b7db3851dd79434ae67bc9b52c26b264ecccae03ef7d86ecf6e38d468c25858ad606b8e09ffefd65675e4c9132f3b13601e94e07dcfca6eb8846618f7f295abf1709bbc0cf18774b4734604bfac50bd8e005c9d", 0x8a}, {&(0x7f00000000c0)="7bcfdf1bc0d69ce0773b78cacbb46ba46aabcfb23342f85cb397b74a72bb6f7803665e06feea0c6e1bcf0ae6599eb91518d8e4c5e1c76d4cf9be94b11c59e7d54334f2c7c32a855d83f1d1885ca03df6e2eb876f64905639444831cd4e640e3418faaa854532e7216b0788170b5917fb3ea54b100c7e267d571ddc88bc753fce20b14bdcf4bb4c7b80ee273d2f07b0b7d0b0a84c5c3aee12e6d16259dad9ad542101a8245db35216b56742968abccd5f2edcfc2f1d8d061e09fe24a0710485b8", 0xc0}, {&(0x7f0000000280)="268d952d1216dde6187b87f3673e4acdbd1d873ce12bb0dbc1182b6969918b1a8ad50d1cae2186e7424ac52f0c8633c5646f5d91747757a5848c0a3052f2ccec520460950c46251d0154994bd0ae7f69053c01b3f2984170116e0bd0989aef6ac6dfbfaa94af7f74ac77f7ab291e7a5f7993d460661a9fac2a0ff8aba15e51615893069bb3f7e046115457931bb6185a", 0x90}, {&(0x7f0000000340)="8640689f5ffa5cb04479a02a665189f2a1a2bbc8e202741341e5aaa8b952f37a37e4dc5fb9fa0c24257d039126b2ee8a51c6c93c886a2cae0f9ccf326904e5bfee391bb0bb62819e646ec790db5af6329cd80e3f8f39bee7b18aa98bb64687c4926c0e7d77474efe2087e66956d612ebed01d0c61a641fca1359a86c499509eecc0190f8f676f35cd182f191edf09213850dcda322374b8382a5457bbebaa28e1438aad8ad1e3c1a9b75af0e7b0b9c2cee758ff50a2ba2639f6501598987a5c6ccbb", 0xc2}, {&(0x7f0000001700)="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", 0xfc}, {&(0x7f00000001c0)="7ac951ab3d9999a34af8", 0xa}, {&(0x7f0000000540)="7c30271c8164917f161dd2d8e399422b6c8533b3af046ddad5c5aae185bc7bbbc52a84d68d31099aa942f6bd1c44dc105e1b5a54494da70850d502fae164fd0fc873675372ed41249bc7ac4d9d7e5ff8917ece05c68e539c701c9a663b3eecf2d8377e60f09d8f36bc593e16fed4ae1f8a4c680daabfab83428d9d6703f36010550b4467988fb740ea0e150fcd2bcb7041fd572f3a6a2bd2d1efb4ab85118ae695c947383570c0a189328cee26a9044281f2dfb2c6713fa60575b053c15c2d91a1a7c7e3fdf053e468eca6fe3280a6177b85e8fb686674f72efd3e8f85fdab1ab7c3e212db320ef4d47cc85934ab6f6abce4c28381305d3528e00061b3471734bd36fa926132a7814f8487a41bbe8e18b5464381c4eeae268805e9d369dc8fb81fc856b5a540f15e6de84ab8af29deb30648ad2a1c09efc43d38572e67f5f2fb4c79b6cf0357c9b3a57cc4788ad66e29b12b13cc54cc76c9ca629468a9b16f5d39ddef88a5e346910a7076a60634ebec0d4533244f0071c410cb54fc0bcde8034ad20f82f04ea023f4c9f6aabe8d2ec946568c65bc6a261e582b656e51c568b0f275146619d09e46b84491b227657bb6955d1ff65da54d5a350b81e1289abc58ff657d24fdd020f7e3065e0407a7a33f2a67e10539e5475b5ec5c3f283916d4cdb8f093bcd2a60a0259919b0ba7236c41d7658286c2b324ee020e7a97b73b84d0888008c09d54258ae97c6fdd44add9ad5233059bf93ad0ad688eecbc2c70d66f115df778cb737eb76de6f36c32111b536c3dcf9e83f1f3c89ee0eb798df26dbc5001f51d10aa90c3233dd21ce54642ad557f37f20ae94624d48c7bcec3e6cea59d9489531e54b8de69c3b7701ebdcdbe26c909e8c12be1b56b452fc6282efb116921cc056599b1a0606897141e7dd471ea42658d09856f0f9f6c4d80ebc9df63cadaaff52fe8fc2e6057903edb1bef92ec07bdbf46d6c0f6353aacdf0145853ee13bd0f93ecdc0ab4742180b5d6ba47a5687228e4a8536384816d62f768b8f84b6ece7994f126326974d4911d4f01af4932be44a6f8fc3190da459ec14459cc8e65ae8d992dccbb816c0f0e537fb5393fe83bc7fe487c47ce5eeb885a01dc7e419c062d4a127816f67d87214c69df88ebd91048dd00af66e8b56df4336e3bc97919d5b82bf734f3b8514842620749e2bf8884a0822e3fd1ed32949068e5882261d0e955b2c830e4e7d4ece27b7b5622319d5a0c83df0bd392d06fa45491a4fba4392236df7e702c04a16d01254135f6f9c4bc39c9461dd9535d35f16633e22ac0d47329af9a4cfb6dbd6e4fae7de54f22507afecbc9c859247a6d22b45c0ff7d71d4820bf3bfe7680d9f9b101dc00659921380d1005b1edd608712c4d9eda041ab4eb637785cc472c7b2b2cef2631fe4fd8d38be3bb0f7e5dcee326568600f4255e98d815453fb575218c6c043cfbee29ad5b0b33e78802c6024d37a810d8b59ebd0d38971e405f4e2d63f230fd4106e523a14013916dd7dbb96f0ab2bab5ba18f515dd733da1d500026627666a33593fd14142e35d451414a0fbc3b61a54526bc0148d76c487ed69b33069db457f5e46912aa8e860d2076cd5a0aeaa89e147371114e7c4bbcb82b2010732c56547dabf81320b76febafa1a125805e04c1cfaf719168d4473524f0c307e0445cb5eb881b45494d844fc994434795a8d1b683e296ae5abe31656aef560f26e0e9137f26468bcd5337e56552bd2d65c33f18d17f7b5e18e66ab20b7f45f7ab2142be5f8a9400dbbfbcd76c53df15339e88d1d6eacf9d72689727df583d7d1d0d7157f2eb4a0398d468154a20920ef7d815c90e901e6bdeff810f23c76e883020e62577d1e11e5f2e1eb81c5e0bc8f5b5be8f68d74b39d363139c3d74baf4b8c5ab469ffecd639bbd6706e31af45a1276cc036c1beed5fdb70b019c78023af4e436c54933aa68712d6f20c554c543b8b6bb7c4c1fa4dbf74bb6076c984f3f6ec178912cd21485af1e77422b4381ff63ba1012fc0f394395e02aaf1734c6355bb0c2a2edc837bb998bc84443f81a1c1e7e9ceedbf886a09075c0929e46e3016f5d6e43e99db8377698befeae87e64054600b28cdc2c879e9c53a3aa5af799d4fb9d69e887dbb4efabd4838473152950e0e6f755a6cd1c69bc5547c9e382ac4002b6cedd3fbe26f7a3ef51cba270f0f9862de60c574cfdc0f9c845f8d57c02d2f15982c2290a39f3cdf4a9fdc845e715d1a1e867713209745c77ad32ae400be87f818ce74666483f80f140b721a52ed5a1135aa88e5d85af4e001626e4533cb2a56467ae606e1af993c2f8b2dfcace5a585e1b21f25147df1f3116525a82b0476b89adbea9e59c8dd20528375183f3fea9a6cd432ac23726cd2f884923b69e475da5d45b6e9235d71dbb48bf061347260bd6617c9a9d9708305c4372adf2b10a9d2d692c3351b213f2672f1096ba0edfc07eb72c75abf06b3c2556729cea8697caac478d4b5d5f92149a0d9ec56d509eb448ba64dfa0f141331e26d291a3932e96ac44b0d65b22b0420152e10d17fc07ce1d1f0c06aaa3d2dbba4500c102625f071765d971bf09d3f4771e9a24a8525e05e2e799badfecc75a791461f128bf9a2afc87e110b23fc5702aed7270a09445d10c9efa933f3d6fc8f36f363bf877ffadb692895d2f9713f5d055b82f0442b93402f551af462c09f2a3b53528c84dd169bbb6994003363ac00ab3db3216110ba2547f3b335d82d3be0cc9ff8301ce80585d0fcc3001fcf2fc3e9dbaf96957c6b31ddc96195cf21148ced40f4029c3966a772af5b74124aadf226898bf012e3d7655f12b27811026ce52ddf9948ab1faf74a90844ebd05e252b0470aabbce1c139ccdb0880e097bd95bf8c80ea28c20cabdf7796e75a5a8afeb763665432657b186499043941652a0d4b2b374f3d2ef1ddb35cb8e88a220c5dcba52e7f2607a860baa34105f95da52698227992bd7c4efc6fcb6e756ecf979cddfd87761b79a08121512daf2c1cfc1bb7f3d0f51ce196fca0e9deb8ba37e15e1abf12a62bf2fd2c94c3ead55bf090db3ac92a3531d63313b6c41f5be93af9fd9ba17d7a10dd1e72522228cc497893b16e3d621c3eff918d2e3bc6a17b9c03c4ffc3eba5b2d77093b3059e29b6b04bf31264810d351bfd2b1bcb3c05335585d34080b4da0e841bf585991c46ff2044dbf574c31b6f489ac623139b10c40ee32cf78a2f7c88895aa0c48dbb4785e3d311dbfa6bc149033e660d27499ab6b8b478de7e9294324fcde20c5b11337e638ae641291058063c02a98191cd55eb5557913d5bc1f15d1def6f94dfd164d9f55e31b33d411905bdd254a747ef9e648b72403336e7e6e25c3096b6d3aa0f67b002b5c2b08f2b0a490f4cc5d22889d1dd5efe6d9901e8f123afb41badf0895c8c139ba41a8115098bfa14916d35a9de2ee408fad5edd28890dc16fa4f7efe47b1957212fc92a639ab071af93432da0b0fe8be9fe1ad02b084d19d2b28ce05deea65f73436fee31db18427263c63cdc1c9a51c48cb938650ee50ff216d7b83313d47298875a97c27dfedd6ab1ed9207d39e14f8ed1a7d92d7aeaee465e46f99297cceff6f70d304b09e1b7b091bebc4378e011ae95f3d41810b75c43a441a58dc700824deebebc58c9b9450c021253582842ad4fdae8128743b2579aadb84e661224aa6f36f04ca258143900192d8f69bb480f79bde9fefac6f69f2fb0c8d035212131ccb42110a8ee070f0d4dba0569f1aeba182805c190856274e6ca0b69eefbebaa29a5e83f16e2016210d4967aab69eade41d299a71cb1ecb4b8d2722e0784547c2a7367aa4fd68d4be169c5edcedf4d73709a73ae1fd92c296c27e35ff6082aa0b26fd6cae3478071870ae1883dc0497fb646dc2ad61ade18eb1011bebd52a4e0e57300c55d840106c440c965be2a3be3ca06f0ba5a465140f9d4ea239911ea508cf0eee6d9be0719290cffc296955ccbb3e19dc007bb9c94bd4fba746c8f6bf37530a328f0163cd3287fa975fb129b410302c8cd4073be3fde294811749d04382112f5585b220ad66a36bd7d5d493f1b359eb378d5fdf9d8c7bb60b3733ccc2309e57e3201382c04c6794b7e89ea9affb05f49545f76d1146b1f813969f3d8f0e429810cfe922ee306b41ff7bf468d2905eb96465c05529542e2386f6f099b9d1c83eb9f65ef0693fba871d6ba79c488b2125a4a067f6d441f8c782c9dd0940f24ffc57df82f25f2fb94b0b53d55079839b358c8ee93fc9c1e77933d15505ced9a385be5b6d02f6f8520baf0eda15a9fb5d24688563a9afc56423f1116539d4de05dac296561604a742caef63281cf89313af29f6aab5c3342f811deadfc8d9001b1c5ba718ce2c3d1211d7c3d12abb4bf09b7f41740155d40a303dab2433c24b7ac7ff0ac2e4a695eb849c54a55ec920ac9ec23d246105034b13050142938351343cffe81b7b5aa698577a42b544d7bb9fdb99743b99570a9081fd846896ce8ee6e1ba11d19bbdd167d72da62aca027cacd3c094fb0e9c990be03850ae3f1fd5ff638399e703f53ae7071a12ab719145b0581e5655c8e3644c379a6f8dbab913dd42203390e8f7b92d992e11d4c8bad3829c056035aa40bbc07fe9eb129ff313d22f36eabeff60c70b5f23fa6ff2f9dbf34df7897a285e842f84fc174411e85131c7d955fe4857c651b300df063c60ee7530ccc03928bcc71588ca5ff5c2282f90804d6e6eb1ce43e23804f9ef67c43d7dedc9bd54fa4cdd4e2dfdacee2f39128c0cf15781946d99d0909c105ed27072ba766d936fe6e443d48dbe3d635a57982f8afc6e2da5f395c3473c6e670f5eb16b003d7b91e4c73f924f9e4339747c3ac5d26a9ae808cbdef527d1aebe1ca70eab63b5c15db589a065f8fe67866e5c23ac025972b5a8754004e3b60ce49ff269c136f0d369749060e0f24e4def7db22f9da38831e926055af8f42029192db5bf1872882790a23fb9a1313fbd5f53c6fd7ba35bfe8323eaabfdbfebde53f52051cd4685074fe8439efa8246149429d4c20abd344689d368190b4cf093b39cad1986d678415cd28a408de47cdde8573ea0dadd104fc28848761220ecafa06f55c3651d0f269e2873b5cd26196a0fbe4167c33c4926c04bf2aee8ed3cc7c2981a8646e49264f12159c1cdd1a1f15a33b0765d7d0cc3b9748e270ec3f0d64a6bed7b375981a713f0ea2316e1220c27301f79ddc6b74639ce21d9416a036f7df4b06cd64513de9c3ddcd61f22d305e2706821c69a6e88a6045b6525024da3c64f9ef8b26e3f8de3baabc05309e5089077f12696b11f1c5eb41b38b86b34f382c73941fb3727c3cb302095ece67888bfd7bcaca0c28459c35e83a790dee75a8761d063c13c4856fd2fccf69c26109a1d63cb2fb550d06c0b35133a9604a4f196256f852a19138a0f6d37a45095bc7e5e6ca08a5bb70a093a548ba7e9bc0651a6932ac14ce04d45fa034418e5fc1bff3fa37327e29bf7be260eff7f04e110896cf98a44a5bab5c35f1ec02223d4f480e9aaf94c4e104a80ad58e7ab74cea0b82dcb1235b71a4d45ec663ba3bfd923e6a8728b7dfb84b7e058e234cc6b2bdb1173eb6d9d67a7740c4086ab60073f16f18ea7173c69d79c9562f9d7bd76ab4331e852e31298343dde6f8a482ff2e33fb0fe2de7be83becc6d33d7506f078f784c17ff396c36d42cb10115f3bd7846ae7e680f01ff2455c20fcc971f25cdbe9526a566d658006683e21f5d0ee9908f466", 0x1000}], 0x7) [ 2378.863501][ T28] audit: type=1804 audit(1578781152.292:487): pid=17030 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4067/bus" dev="sda1" ino=16737 res=1 [ 2378.934404][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:12 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:19:12 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0xe09, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) recvfrom$x25(r3, &(0x7f0000000200)=""/201, 0xc9, 0xab1603b72060f663, &(0x7f0000000300)={0x9, @null=' \x00'}, 0x12) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r4, 0x4010ae74, &(0x7f0000000340)={0x2, 0xffff, 0x51f}) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x0, 0x70bd2b, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x48020}, 0x9) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0xb9842e7f07ed7fd0) sendfile(r1, r5, 0x0, 0x4e68d5f8) 22:19:12 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x13c}}, {{0x0, 0x0, 0x0}}], 0x2, 0x84) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "0000000000000000000000000000008d", "20040100"}, 0x28) [ 2379.229650][ T28] audit: type=1804 audit(1578781152.732:488): pid=17768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4068/bus" dev="sda1" ino=16724 res=1 [ 2379.296141][ T28] audit: type=1804 audit(1578781152.802:489): pid=17769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2352/bus" dev="sda1" ino=16737 res=1 [ 2379.297632][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x80247008, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "000000000000000000000000000000f0", "20040100"}, 0x28) [ 2379.472155][ T28] audit: type=1804 audit(1578781152.982:490): pid=17772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4068/bus" dev="sda1" ino=16724 res=1 22:19:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r1 = creat(&(0x7f0000002480)='./file0\x00', 0x80) connect$inet6(r1, &(0x7f00000024c0)={0xa, 0x4e20, 0xfffffffe, @mcast2, 0x80}, 0x1c) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2379.611083][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:13 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x1a, 0x6, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:13 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000080)=0x6) bind(r1, &(0x7f0000000000)=@ethernet={0x1, @local}, 0xfffffffffffffde6) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000100)={{0x32, @loopback, 0x4e22, 0x4, 'rr\x00', 0x22, 0x1, 0x45}, {@rand_addr, 0x4e20, 0x4, 0x9, 0x9, 0xc702}}, 0x44) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x4e68d5f8) 22:19:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x80247009, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') sendmmsg(r1, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x22c}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0xfffffddc, 0x2) 22:19:13 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x20) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2380.004869][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x80287010, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x882, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000040)={0x10000, 0x6}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2380.368164][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:13 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r2, 0x4, &(0x7f0000000000)=')[userqem1\x00', &(0x7f0000000040)='./bus\x00', r0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:19:13 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4800) bind(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @empty}, 0x2, 0x1, 0x1, 0x1}}, 0xfffffffffffffefd) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000040)={0x7, "2cd69d24a8d093145a83dd49c47bbf8fe3f38df15259cb38b1bfb49b158ea265", 0x5, 0x40, 0x6, 0x40, 0x4, 0x4, 0x5, 0x6}) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x4e68d5f8) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$EVIOCGSND(r5, 0x8040451a, &(0x7f0000000200)=""/161) creat(&(0x7f0000000140)='./bus\x00', 0x9ac3361de339ddf3) [ 2380.524447][T18928] Unknown ioctl 1074816013 22:19:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)) [ 2380.793095][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:14 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000640)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000680)={r4}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000140)={r4, &(0x7f0000000100)=""/37}) r5 = dup(r2) ioctl$TIOCSCTTY(r5, 0x540e, 0x8d) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) sendmsg$inet(r6, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000200)="145f29235170ae30e3deaadedb1ab9568e54948dd7263e49528fc3e158e060014f01873c3ef1cc798a7cbab51c75a73c95fdc6cf6ae6c7ee97e3a88ded2a9a1b2339265213064bf376001254bdb7fce1c4bb289b4136112f5cfe1e347c6f81b2090005170bba9ad8109275ace642c8e6f3bc", 0x72}, {&(0x7f0000000280)="135d9acd79c763c4a1b7ead10240cfd0a27a29eff5cf17e37f4be6faa50e4a725f88fc6835312ca722fab997dc8ba23a9b1475838182cfb413d464330d497c6938414a79a3e5c222f6341d0381cef1fdc2fd6f1b6f04e94432d22df992b5861b8305f867311cc09b15e78ba987d2eeee7efb5eee509292166c54fc85e60a179dc8514b965e72c31b80a5d2887ca8b5df2f913c608187f27d80e215894075f0fc7f92438ab4f58fa2993a18a634d28f7d4d67ed9d0d8caf27157b38bc467a6ffa8cce72d9556d0bd49ebf84cc42010277222e3e196db6e2b69542", 0xda}, {&(0x7f0000000380)="9b569fa5c255539c277511cc20f5a2153b8b0774b6a760df7070dcf2848644096e5dfa64730e9814f889000adf41418af42cc6eb7f29db24e470963168699e02b05e5335bb0f1f32347e0590debfd89a641a62e4b6bb40a9a78623cb87415eb4c7671c8f8fb34c4768d9f011dc3c926ea9e506b26a23c5d143d5", 0x7a}, {&(0x7f0000000400)="7cfa2dc8f9ad516b9510ffe23eda0becd6b2a107b7ad58025737a6c8968333a7e8083b0ada906f7240e6ea78792447b815ac321da7b8ec6528c69e13dd5c68e3bd59892063777f8c7669e220c59b453dc60358aac1b1c8a0a4e73d10e1b2b890ab8f9fbec14e636057d234af4f5a3d073aa6896cb966d3860c5b4eaa7bfcb2d338dbc3daa6f94e66549ae5d81690f1075753269eecc74ed6a534fd7b028fcb22ae4a37a213b146be083723c1c9503cf4d487cc46ac4ec7defe8b53ca15ffa846743f07595e128eda170c83b1d29b314c8b", 0xd1}, {&(0x7f0000000500)="c3659e2831103287f2350271a37a0135a551741412b95fdd23f6a47e904264ccd222b7689f46c1f44e1cb8f8cff8c80783f8644c389d8c350877a737a27e3afc999c277b5b8be016c5be25f1e67bc0ec79163555", 0x54}, {&(0x7f0000000580)="d270b97eed3ec494de4475a5e5f5c269ba2d8cf9abec23f5ae86dff937dfcbac6136d39186e73e287a1e2575eea8e56ecc64f86d723759b9dec544b7c108d604fdabf79a433a33628dad3f49c24ea764c7c6bcae398c20b0a00a81b81e1c6ace12c6fca1845bb48379", 0x69}, {&(0x7f0000000780)="8bc6d622d8559672069198c9169a6b5a91605a298d1d9ccae3c9e31cc7206019345c16c4d3e9decc75b01b023b40391c3ab754f85e9eb4bf2c13b7400ad18041ccf384c2656867de2549063e1bf46927f47cce37a798be56f814b9b68c3d1a081c74f229d0ba167b2ac39ab0c2c73796c600b43e4bf459fbfa3959ecf5ce6f778d275c82fdcc39df11d6a4", 0x8b}], 0x7, &(0x7f00000008c0)=[@ip_retopts={{0xd4, 0x0, 0x7, {[@generic={0x89, 0x3, "e5"}, @cipso={0x86, 0x16, 0x0, [{0x2, 0x2}, {0x0, 0xe, "fbd30558313d2a42ab3f6935"}]}, @ssrr={0x89, 0x3, 0x22}, @timestamp_addr={0x44, 0x44, 0x9a, 0x1, 0x0, [{@local, 0x200}, {@local, 0xdf2}, {@rand_addr=0x10001, 0x100}, {@remote, 0x5}, {@multicast2, 0xec}, {@multicast1, 0x3}, {@multicast1, 0x20000}, {@rand_addr=0x400, 0xb103}]}, @cipso={0x86, 0x14, 0x0, [{0x7, 0xe, "9d6a0b40d62d757368a2dd15"}]}, @rr={0x7, 0x27, 0x75, [@multicast1, @broadcast, @multicast2, @empty, @remote, @loopback, @broadcast, @broadcast, @broadcast]}, @ra={0x94, 0x4}, @ssrr={0x89, 0x23, 0x27, [@broadcast, @broadcast, @rand_addr=0x2, @remote, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @empty]}]}}}], 0xd8}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r7, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000080)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) dup2(r0, r1) 22:19:14 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f4) 22:19:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/80, 0x50) getdents64(r0, &(0x7f0000000700)=""/66, 0x42) getdents64(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) dup2(r2, 0xffffffffffffffff) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x550aa3d803ae8bfb, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) r4 = fcntl$dupfd(0xffffffffffffffff, 0x80c, r3) ioctl$PPPIOCGUNIT(r4, 0x80047456, &(0x7f0000000200)) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x88001) r6 = socket(0xb, 0x3, 0x0) bind(r6, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r8, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) bind$unix(r8, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e) setsockopt$TIPC_SRC_DROPPABLE(r7, 0x10f, 0x80, &(0x7f0000000040), 0x4) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) 22:19:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2381.276951][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0xc00a) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:15 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x80, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x173, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000640)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r2, 0xd}}, 0xffffffffffffff04) r3 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r4 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PPPIOCGMRU(r5, 0x80047453, &(0x7f0000000140)) r7 = dup2(r6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r3, r4) 22:19:15 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r4 = accept$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000080)) 22:19:15 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) write$P9_RSTAT(r3, &(0x7f0000000100)={0x56, 0x7d, 0x2, {0x0, 0x4f, 0xffff, 0x8ef, {0x6, 0x2, 0x3}, 0xda040000, 0x100, 0x1, 0xff, 0x6, 'cpuset', 0x1, '-', 0xf, 'trustedvboxnet0', 0x6, '}\\%em0'}}, 0x56) write$P9_RREADLINK(r0, &(0x7f0000000040)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc008551b, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000001780)=[{{0x0, 0xfffffffffffffeb3, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000000000)=@phonet={0x23, 0x8b, 0x3f, 0x4}, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="6c4805d88caf06f068c88fdf8e2ea96672df32564f63daf0a391a7dbc95cffa7d41cd22e46a329a412073fab75582f305dc4a5a3a59548d64579f64170545935d1810e5fe89e6597059b93820e7cc24f8dd83ddd62d3c6f4e0f5772cfeb871dae7b45df53e2f00dea4767ce37d864a59b08d611d527fbca80a4ece314b864c16380c1cceb3e0049668978c5531778f941a628a5fc24f8dcfb44d4d53ce57f4d7d0a58d2543009e0fb8406eeba7cab56015588bb27b4d5b16009ae505b5985e30ce323dee03f5cdd1cf55f6349208256efd3294d80b859093c713a29014314e766f8992caf84fc4f1cd3177b468"}, {&(0x7f0000000280)="5d416d9e11548bf4456ac09534896a91ded777aadde451774572976415a54e53ad4c4ac375aa07503ec84c7f5d008737a20a4a0ced98a1e74570511bedb41a14e0f304c0dc1f00f895d05b00c81e42cca6933408f2a8db2ad59315a4cdc927b9a2d71deb8f9e0723a348cca9992b2ed553d9a10b0294cf79e6d1c379ccf3d69c99ab8ceddc69e0568a81c6d3"}, {&(0x7f00000001c0)="9db40336e054064d75f1f14804370388f3351250cfc841fda05e0af2b672d3f6144317163e251604ee8dcc5e"}], 0x0, &(0x7f0000000380)=[{0x0, 0x115, 0x8001, "411fb3269ba3dea6585ab7daae405cec73fbb1269d22435467e8dd68429940e7881d213461ac53e9d76babb7d60462910cc06c14992fc87d269d948375bb75144a93a8e20be8dcea149b8a99c9d22cb39a98db7d6d2cd13ae6c68158de"}, {0x0, 0x102, 0x1, "fa33ac51dbe62d4edd257327fa3aca39da6ea069222282f1016a70e499538c9c9feae38eff61848ec5ced6c11312c884c9ee747b48d2c763c09934cb00b79301a7b0a99a968f6feb32285bd74291a1b58630f06fdd85720b8dac8cd5cb9aabb86bd9d290050ef35dc92d3b2b39728a615aa6dc769cdd93eee733b95891385a754471386d2ed8023bf18c0032342283ed81f47811eb0be5e304f85ca5f9fbf4755c60835e3addb4e8e141bfa6fe7f4b3140c4abd97383b88e2b1dbf81fe3dd52e5f221ac8e2ffaa30cd3cb994b0c87c0edd489abb38868a52afe5da"}, {0x0, 0x3a, 0x2b0ba4a5, "00f25e5e422040689c90e9e6b0ca6d11b84f303aad3b5f0e28e9bc4f29ada61d45ca2479c3df0270d23e32e16eae41f06d39a47671aa53cca566f02d14f0b369b5d2411226b0cd093efb3819f4a6ee4e5b02602ba4f09ffc74cb59cdbf173afa25aed91a5365e04c6b2554a1e6cd3738b2855b5e7933abff921e8910c5cbe35da99941f0e07b9ebc2cb5f190fea4c3b9caf65a6e05191d9562998551c6b226048c0082804bdb31922f01d675517c4a089a252c610a755d8f8df70de064f1b6a77dc44f7b9595a001493dec3f916736afb54a00d39b344f682018b127e874a9d72f55c2"}, {0x0, 0x88, 0x0, "5db52383ae8d8bc50c93241b6db1c0271456b09c6dfc2522ebd31a85dc68afa5f78a3e03b418fa0221c799c2536b97270db6e00c6a76cd5cf190c6f60652fee86a952e3a66ff862617c8d9dc7df609e6d13f4db0da4e3da539287a6a3ae965e98905fdfc5eb44cfa029be1a5c99502eb205989e63780cd58762a86c2f523371de62772"}, {0x0, 0x116, 0x40, "cf34aa5dabd9809629b20e1a9ffc40ac92b6cc4dcd8d32957c7c1a89a0bab553158c6991908b096c368ae20c0adde158192a73c038570139144c"}, {0x0, 0x10b, 0x9, "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"}, {0x0, 0x10d, 0x400, "7661839e5f66169ef5ffff15e657bcb1ff56c5f44f1ea8b2701f403ce9fcc367e270fffa039ac729d712b80ecdf3318b0f406fc7e2005ac4c97893980367a71ac3fa45c8eadcddbed2be77e569634c71a6a291dd7e7863cbdce8df128f9e9d4c5a6912c835ef25aec5b298615f434f03982bce343bae"}]}}], 0x22d, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = semget(0x3, 0x3, 0x40) semctl$IPC_RMID(r1, 0x0, 0x0) 22:19:15 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000002c0)={0x7b, 0x0, [0x0, 0x400, 0x2, 0x7]}) r5 = semget$private(0x0, 0x20000000102, 0x0) semtimedop(r5, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) semtimedop(r5, &(0x7f0000000040)=[{0x1, 0x30, 0x800}, {0x0, 0x411, 0x800}, {0x0, 0x1000}], 0x3, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x228) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r7, 0xffffffffffffffff}}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x228) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r10, 0xffffffffffffffff}}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f00000001c0)={{0x3, r6, r7, r9, r10, 0x118, 0x1}, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x66e}) dup2(r0, r1) 22:19:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:15 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r2, &(0x7f0000000100)={{0x1b, 0x5b, 0x38, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x4e68d5f8) 22:19:15 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:15 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0189436, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:15 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = socket(0x11, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r4, 0x40045010, &(0x7f0000000280)=0x2) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000200)=@req3={0x10000, 0x3, 0x6, 0x200001, 0xbde, 0x100, 0x3}, 0x1c) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000edb", @ANYRES16=r5, @ANYBLOB="02002abd7000fedbdf25130000000500e4000100000006001a01000000000c009900040000000000000006001a0103000000"], 0x38}}, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000240)=0x9) [ 2382.261330][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 2382.261346][ T28] audit: type=1804 audit(1578781155.772:502): pid=20458 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2357/bus" dev="sda1" ino=16801 res=1 22:19:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@broadcast, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2382.440222][ T28] audit: type=1804 audit(1578781155.892:503): pid=20551 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4074/bus" dev="sda1" ino=16784 res=1 [ 2382.544172][ T28] audit: type=1804 audit(1578781156.042:504): pid=20815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4074/bus" dev="sda1" ino=16784 res=1 22:19:16 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xedbd1e9c841ac3a5}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x6, 0x6, 0x108, 0x70bd28, 0x25dfdbfc, {0x2, 0x0, 0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x20042408}, 0x4000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000000)={0x80, 0x7f, 0x8, 0x400, 0x400, 0x2}) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:16 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x151042, 0x4) ftruncate(r0, 0x88001) bind(0xffffffffffffffff, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0xffffffffffff1e56) sendfile(0xffffffffffffffff, r1, 0x0, 0x4e68d5f8) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) 22:19:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2382.816816][ T28] audit: type=1804 audit(1578781156.322:505): pid=21018 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2358/bus" dev="sda1" ino=16690 res=1 [ 2382.912975][ C0] net_ratelimit: 3 callbacks suppressed [ 2382.912996][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:16 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x81002000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, r2, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000001}, 0x4001) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r2, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) r3 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r4 = syz_open_dev$video4linux(0x0, 0x0, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r5, 0x8004551a, &(0x7f0000000240)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000080)={0x0, 0x0, {0x40, 0xef, 0x2003, 0xd, 0x0, 0x6, 0x2, 0x4}}) dup2(r3, r4) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000002c0)={0x1, 0x80}) [ 2382.982925][ T28] audit: type=1804 audit(1578781156.492:506): pid=21027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4075/bus" dev="sda1" ino=16818 res=1 22:19:16 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000040)={0x2, 0x1000}) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) 22:19:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2383.038151][ T28] audit: type=1800 audit(1578781156.542:507): pid=21027 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16818 res=0 22:19:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0305302, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:16 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) getsockname(r2, &(0x7f0000000000)=@x25={0x9, @remote}, &(0x7f0000000080)=0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) getsockname$netrom(r1, &(0x7f0000000100)={{0x3, @netrom}, [@remote, @default, @netrom, @rose, @netrom, @null, @null, @rose]}, &(0x7f0000000200)=0x48) sendfile(r1, r3, 0x0, 0x4e68d5f8) [ 2383.226081][ T28] audit: type=1804 audit(1578781156.732:508): pid=21211 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4076/bus" dev="sda1" ino=16648 res=1 22:19:16 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r5) r6 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="fa288fd735b68b38e085ba", 0xb, r5) keyctl$setperm(0x5, r6, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) [ 2383.325569][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2383.464231][ T28] audit: type=1804 audit(1578781156.972:509): pid=21386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2359/bus" dev="sda1" ino=16691 res=1 22:19:17 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x7fffffff, 0x400000) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f00000000c0)={0x4, 0xffff9235, @value=0x2}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCGETA(r4, 0x5405, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000002900)={0x0, 0x2f, "727448c3cb525e44412ab9378e89a299e041a006f39e884cb176d65680e74672dfb449f0caef92bf2b3771cdf03a67"}, &(0x7f0000002940)=0x37) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000003a00)=@sack_info={r5, 0xffff0000, 0x8}, &(0x7f0000002bc0)=0xc) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000500)=0x10000, 0x4) r6 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000002c00)=@sack_info={0x0, 0x7, 0x1}, &(0x7f0000002c40)=0xc) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r8, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r9 = socket$inet(0x2, 0x80001, 0x84) r10 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x7f, 0x0) ioctl$KVM_SET_PIT(r10, 0x8048ae66, &(0x7f0000000480)={[{0x10480, 0x101, 0x9, 0x8, 0x0, 0x1f, 0x4, 0x6, 0x8, 0x40, 0x1, 0x4, 0x6}, {0x0, 0xffff, 0xff, 0x4, 0x5, 0x90, 0x6, 0x40, 0x3, 0xfc, 0x3, 0x8c, 0x10000}, {0x3ff, 0x7f, 0x20, 0x4, 0x2d, 0x3, 0x7, 0xff, 0x6, 0x7, 0x5, 0x83, 0x5321a308}], 0x7}) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11}, 0x20) r12 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r12, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r12, 0x84, 0x1a, &(0x7f0000002ec0)={0x0, 0xd1, "cb77038323529db14eb455c827ddd30e963d25f1d8b08ca5adb8f5cb8b4fabefe39418cd8cc1ed9afadd4f947177b22abfe398830447088ef449ec3b0e27eccec348b218bbdc2c74ba28b7e37e1b32d811f24783429df00dd80c3d069bef27b88203cd208fa191c30547423ee7b64a08f488222529e0f8fb8461761b68d7916bf1c72d1227a74a448cfafd4cd341b9d9366b51ebd6c6bd64ca16b4d62fcaf022bd1d2b3656c6186cee17d9d0e5ea6ab26a98377867c280fa9afc42bf5331e926ec8c8c5d0e7c71af87e408e757098e4ed4"}, &(0x7f0000002fc0)=0xd9) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000003000)={0x0, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f00000030c0)=0x84) sendmmsg$inet_sctp(r4, &(0x7f0000003740)=[{&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x3, @local, 0xff}, 0x1c, &(0x7f0000002840)=[{&(0x7f00000001c0)="52c217506d10a2fd6c639ff00858f9a173a985f1ba3c643ac17f31afc428d04616f98bf9dac8ae86af7fa276158bf7c1216072802532243445b193f52b1c5f00afe2da5670f1cb3ad25f60a2e062ae1b97a52d5352f49ff3462d6423e11028280f071d636e27cc33cc92bececabe6a", 0x6f}, {&(0x7f0000000240)="5c4e805ca470bf579a54caab7626152892014527ecbb14eff70eba02add819654755f90ececa437c5998919822d14653a57a74ef5b4946edc9600cc4d73e208361e5dd231cdc05ca31e69109daa488f5b207fcd2759a50f5ea9ac6721964c576cd6c4318e48069c18703db57338f8cc9c87a5c545b994ee138c42cbc1e43e3ef62836c610db338eb17947ae75b7d76d3bf4ec297188db2aaabaa994be7dfc8e7181d5abc652b3f067bb7bd08014c2e18aafb56a1a66c7ecc0483239883b9bd33621d3dac7fb124623215569d22bab83c54fdf9d34227f9045e0e5b8127737af3d51007b3ac3f39f3a1", 0xe9}, {&(0x7f0000000340)="b79b92b2079dd7f5e515cad10d98dde797598b5be6cc72167b22f37ac3efcf1af475d7d84848b44ac91f8b8577ecd19ffdab3a908ad199e9c81afd57b340a24d140644befdc66aab21f35128f6cf016fffe8684a29842f5f8f6e9ae1e20bf0b09a2bc2eca710873ec6c09a06f6ef5d790d36e203141a155f1ef94b1b3b2a34a79440d0127dfd6977b5b6d92dda2d62d6fac056c20708d8db78e0a6dc990a900947d36d6c0d34e9015ff992c8745ce3c8b1f1e799339ade2ecd584b32d0c4f1ba7b704e3cdc289baba8d1c280afdb8c750fae65b1", 0xd4}, {&(0x7f0000003840)="9dde621586c5b96851ad887167e647fa8ea17ac11f4013f94a200864ce38667b5c96e343bc8e589433f17a3592434321a9b018a3d8e3a9bc35752a4418a3c1da3c2fa794fc80d2c1ae2dad521654c194209c2ba195f0d97ac6db16d649596e7bd97e0fd01e7ba208319fac8e14e7fac264239a7a5dfa93a35168acab72114fbb0a9e6720b54cd7e02a980ef085ae97abfc935b0059b0adca5be520151f3b286c2cae8617355bc19bd49f235f74055a42011b33e94329f52ce180aea61867760b3741f83333c56cc685a84113fc3d7bf73425becd6f3da6cf67476756cf51ea9dc6b2c076651ddc3e787c7efe247f84713781665016a66b0c65f6685813300a8289b23cdfce80058fa26fe83ffae85747d995092e2710f69dc164b6870fb0003091e29f6b66f6626389f15c22c64b4c2f337a68d7b034ac8d966c18d5e750f46273cd032ad8aa87bd1dbb4b7557cef1153370cc1f3b121d967b311e22a4e166f934c80581a309f3705df0c81e0d68db2bfe0b72cbf530213503fbc0fd887be249ed10d631837d7d0fd9f3be09f19ac5dced71f8445f4f9ff3494cc4ce678a", 0xdf}, {&(0x7f0000000540)="65c3c3af0665bd6d3ae69aa02f6d54c91e4d35cc96360a1e40e61ca92041802b119249838a32c0049c782d2c13e33b362c444d4bf17687959178d4eb53a90841d966d9b3bbfb54c896db231dfafe93e9488eef6628a47c12ba614db09e0086d5ef1f1e90a1b1be81a342ef13fa6380a8ae73997fa46a4567ebe1b434916d13d2c08ed3ab47769d8094522b475342bd0078132f2dd72430a41aa06425efad6ea35d8e1bc236685aecfb5eb30fe844a12069392e4e2abf7883236ad65120ae271e86d5c3487fc8bed0bcf85e68f072354b390b8f212c609880d9b3e9459f43", 0xde}, {&(0x7f0000000640)="8b9c83cc4241e8c46ca4dfd2212d2a93212903c7dcc56d108b3d806ddb87a2bfa0b07a2e5769920a54fedfd9281fc6786cbab30c7f73f44f3dfbb5b58f8c4e15398860003ecb4bee5263191297f636053f6d77e5612d805b5e7f3604ef5b1cdc09dd58dbfabd5a02fd8509d4550901d3a2da359684ac45b02f0fbefc29cceb347a5eb357e220ec61f63e764b49a958986fcff91d16c16de755f97df29741e3be353953e7f617ced953c8fc2f1f0f8e93e0cfe7a49296a5e5638b92c2afd8a14434a287c20a15abdaade3a747985e87463571c47f6bdd8430130274e9247448b565ba0010d9ed25d53abe98e6414a52c01bc69cc346a3d4a70651cce3c9f1451c5887312a5e00450fee9ae4070367a596768530261dabed94377df39adcc0954a496e01e4f175d45d963ad42b696fe2a319505e45893c8aa7298f274c05d7a5deaec77b4ee01e9654c44355f7b6abbf3758637e8ce2be79f107bada2549d9ef693905d93d6b096e94579cfb2e38141ae94c468327434225b1d24f7062db336ec59751e09b54f1e62c4acf3e2c50f3ea396a46f5ea610060d37da05eb7cc75baebe2f3592cdd1b5de515810d612ece6e270b802ac96f8ba846ae3e1ba53761e9f46d938ae2f85a2d81098086905598202f349bca2c3e1ccf0d285d81a8ce6e4ea665c612763eed81c71f26fdd76acd22bc4ee45e6a5640d9068a6e5006f9130be094c70e1361c73727d24da50ea1ca69584b855e565b021be573138a9176a7c433b138bb988109a64c474666383bfd29ce789798c15c74983e34e85a825288f5b86761d026035af88205927f99825111b16dcff3dce760f7493d0ae29802d3c44ad4dc2fc1cdcb83e596e68cfb52746c11933cccb503d81afad1d809d7b5dbd4ba9ac675da91d54c7ab0b2289981a1acda7f4b5d600e494124270085ceb89e0923c2cb4734b5adefb33696b2f5ae027afa5859d9ba5a5e76bc654b85fcbc4aaa7704645c2587c98ea6ccb71371af39358bcfa22a0e8f3d0a5d90c77caf5c41cd9a8ee8f2ac4c2b7ec64b9ea9cb512607bd755fe42938abd4d7c09d1995194e8b57f5a1cc5482241a2cce869d701587a7ebb07b6ba0a907ac9bb2650f54e7420e9dfbd248686b06ddc8c91b5b23f0fdeefaa576b82776063ab94fbb308bac84b28f8878a871af814ad3fdcdce9ccda549117e042517cad802ffd4d275488bc76d69389ffa52dd2c70e6e42112e600a7693acf04034c6cbb5fba63898169bce7bfb57f9420bd2bd736b034a6047346977eed0bf80cfe171b7d760ad7fe2d7127805aa1fb993e7ea49d06687df73c7a77d5618641572af22e9ff66d10bcfccf9d6cb4ff329744c4c8f2ce586179be10d634f6be888b9f67ad7b60f53d19eea41dfecdddb03e7eff756a552dcff3cda3467b38e184d254acadfefb66a95575400b11e9b1cf8bc1449591ea58cdfe4863877597d8206a3bdf2b6ac86bea2cd5d2fe7c157f3a5e63fbd688b51b38f565ed07714239c5ff87853b1405264bc329913ea353c1b8edf614f8cd59e04c939b59cf400174e6e3feb28888d4424ed3c7b0d986ddd88d1786de01ffd44c79e11712f420b8ef96f55555f812e3fa6eb3888ec4db1b738b9d84551207a601cac2bc66e5b6374d18567c32c4166b998f2956fc3c4fe54edc1f1059109d83088971817e82d8ed2a95d7809f76eeda104b15fa0f3ec1a93eb60224f5761435ddfa0c0e713baf00f0cce89a1ddfc3c4a662382e99e591cebd33631d75b4272b121dd69b8f50f87e183a104cc7419a9155b29eac6bac6a3d0328b888019c603592199f0378bb066a438a8ae620bb52f635decabb920efe7afc3545f2056dd237807e5bdb0e078a4bb7aa48eda10634197d98e852a7baa2002a2c714bb203025fa4cf16145099fc19b2a5e125a1e9cf8ef7f9e1ace9e52636a2403b6623cdb4575be0bee84e58c53658432ec08d8a9cb2395bcdc85921921b8b38ff615c32c0dbfe5591a3857dbf81922bb2148b8fcc576231566f4019753eb0f68a05fe7d971438672bf6fc454dceea73f3e9e85b0f72557ed2fc49ecec118d24e7b4ad0f5cd3fc223216a1797991ae41026fdf543077be5e63c8f630f12f95118a13715390f76baad67fc618d29dc7ca327b38f32a3102114b48c210aa9979b1798ff06547020e4dee1823410ef17e5a53abb7a193ce464e166ea1e56f069cdacf4faf1389ab57af9cdb92c704bd0387d4ad9f80cec774996c00f90cd467fbf52948630b5b61e971658c9822f38484fd811ef8b1ff6809fa4556206182ade83e6726bb32d3285cf54145335f7dff560d7c1a928e95204287b590e7cb6d4470b7a729971640b8eb2fc1bacfcb63cbe18abf849c7038e626c27f23e128d180397f21c60c58e9aca4f6cdaf3e811ae92594f53d8d8751d9620b2edbcf8322265b01fad1ebe8305beb3695e5f169a4dba8827a3cacbff35741b0aac0da7d94ec1c4cc65881e7fb3141811bcaaeac683e47eb8ebcd788be29869401d2bb15fd2179e6da8b8bd67633bb7392caca9bfed52f51321905df3f584e2447fd56e5eb4ca7817f4821cbd670c8535d87aa51e660d28474ec2e72d7300d90de36c02396c2f166a44a62c6abe0e54b35fc50f18beda20c42f189fd9cb113871dd0380360f7ad3c8582bb59e79182a9fdbe1126cbc538732487e10d29090726b0d45332d979349c00818864c5159e9d63c398721624efb9a44830cb2fbe50d381687572cb8ef753d572889ed0dcb63cd6cfbcdd4283251ba5c3b0dce6e0a686a2b69565b8bd2960fb180a42deadba20f47d3494ba7b6a89c2875c889b69b7b9feee0783852f13a7e4d76f6d9bf2acd353303e99fe2617ce6051e74e3f5d6397f05ce323ea1834d2f08c3a6e9cf790b28afe1708e3e8956dd0c3e69a48ccb18d70dbb6b6ac8bf91606e02862b23c7a803ae977cf769a8eaaf05f9c524295ce2c1b53b79b807b715c97e640be6942dbe30fa44e93c15d8d23e1dd3d8df8adf23193f70cfb8b049f1b9b3356d100abfe029f411247f5df5200e83c244e272de098189fa4802c68a007c2d49a6bb981b8a401429b57f0dc01094a9f01562b3aaf0a9e5dd06cd9121a180107538b2d192fb55f1a8b69f64f8b7872ce238707dad6fc93f6313f8b2bc28c4160f5830543d6e7cbd61512640fcba67b8da79f6221346fb1dc48a1d92a3211b35a9e9d4086997874ceb96b4f67bad32c8148a754c2b42cf735590f1a38a539956daad1fae35330472fddfe0d10ad290f7e148c48fe03bf8e5a813a2f3fe98f3fbbac16f63402477361455b92540e7453b2a01cb9f4ec254115660bbc93e65502724797848416e9f6caff1fdac767ff196e6effe8efd6ddb6caba4cb43b4467ae6db3b3c0b32185fb5d930ad0bb56d235a01296294ed04500f626fd949d61d1480a07fabeef803d1fc3f08ae0feec14f3f146729bc61197dac266311ae143a553ac65ad371185e407ee4f5c5a7b1e5d098b05f03d40a04d86981eeb60a38c11fb2d270b198984d4baa41dfd05c39ee713236e1e8d0c6986bc1e09ef8b99abcb2703f16db500bf9833494e5ec5c8e4d759e326ce5b915a1ae0ea4184f947ba9045b41f19830aff8afbb4139b933f544bfc454a91b1a069f6e7dc9496bc3771a8421ac0f239021ff73cc2ef3bb599c8ac179b434780adee01357ae4cb8aa6fcf24bc2203b0e66c740557faf6531d36246a6eac086f5e81c0746daeeea380f9a588c53dd0bf678a161dbcdd39e344aa8152b9507fc8072419161b2144095cad25cb25d03c5d2a4ce0b2e77c69d9823475131e55c4a8f8d1b9c90d75f7006525b83fb33b0afb476aa213b2855278fa704258291395e5b294218dc13eadb60f997b9905f5c069b3b42408e98e013cbb2a3744d1f7b4e38f9229c735f254a65a5ca60bbae8e279f46b06bc95776f9cb8ca2f66a295a1da7640b5df504b62771e0e1e5dfad6f53e78a46b9356b5337d485c02c5e693c27f35a0692812cf39ec656cc96abf1c94fd4878834cdfdeff9a587ddec35e9b923146e72d0d38563c866e8aa7b06b63884ce192562d0efe5343245792873936974fec292bf76af8ec99ed70df8b451bbbb694918643724d9fbfae639a9d7a0df2609f93730bc5d0802dd1edae7d0d7abfd3083b9b4f3a60da795a43e250f5279bcb9bfca0f20958282307e784ac3787de1cfa67712668ff639386e5274f26932989f8b5460ecf6750963d40fb3923645fa117cae3d76701eba96b6cbcc5aa3f686546c804336b49675b12c84ec7e551a3a3eb937415f64e9064951babe5101202aeeb1dd8a2d308990db0f32f6a2d0d6912e2c49124b456010a38f3eeb71e49dac9387d7cd525357b3db6096bc5a857455b1772ec1379f29f861653de0b91a10565b3d0e4452d6ec7a93515304f027576f24d306a51922e329914ac0035f2c8493152834064d1174df7becd5bedd93aded7ffd4d8d73894a2109f222093dfee26c5cd23f0040cbba95326c8e7cc49793182928f174f2ab98be9ba6caf183141f2cab1f84ef2fd872984d91968ae82f8e88238100208fd0fab45693c51f3484fe72c9ecadbded547a2f49d2c6dec7cf75291141ed2f2ebf94a9530ce93b489a32c56c520e0ff08bb0b38568127d2a5d68c82a2377afbafd512f98f97eb5d1dba0a9c85a56c719bed5f058a4d5b5f101b1d5a199d219b382581938e034b588dc2e31ba704426263620c0093b49ce4bcdea39e7d6c86566336723667ed5e4dcd6d4ad4fd314a2205de98f9e2cc6f98e4842b09d0ca8d89cc8d0b8073547bd2e4a44fed43030fca9cf49550973309fb0ce806b1e5ce16972a04948643b19332819baa0478690ceba66271177d589cefb074db6f4e4070dfe30c55f1c0f58c4667dbba7869bf9c5f95574ffa64622d1a7bc98ed45d08155de140ca4ddc7ba091e51a38c4ab54076cf1d9a988c638b7970ef3f67bce250e4e1c64f7415837c9d7fa6f57e224871a98c36c271c72df4ba12f4986348260701b6fd324557c38d22d0a41a2188f43398443c7f82ad1043422d4ebc704f3f6dbc570ff80d5eaa18c81f249a5060f5f9be0f288cbbee4893c7eccdd740ae69aebb9644f1b677d508a37241533fa56819ff1afda81850ea6a5439f6101367861574060a6332e058ea17faae7231617a97d6092559acc73a2cea8e04dc722a1e437c4109dfede4485ea1834e7a13f3f62934bcca5424a9faf873b99c6e6c187547c76ee45f8976b5b543e90c5ea9f303295ae3eaab58b0701449ebbdeddf7b8d4112e7dd7e064a664a81fd2c4fad157ad6ce6752f38891b286979dcb3f238a9743b3ff193fa38baf6dc978525c9c3afbe291b09c5c82e0a4ff403513bf1fa714bd635525f45e18911f77ce32204382cd1536d9289580d6ee4d76515f2c3da38814c2683ff1d616733078c62bc1855cfdfd5a10d13f42e02589e097944dab914e24287ea3d2e0c7d783dc621f934393bd789e4646f8761f8a533301da0a7e621c17d4fc6c2c4012ce9f3b2fdaa0d96dbd4d2e32dcfabcd7b60ddb19ac8313ca34944a58613f928cfcefb4c7bd3696e36f4469b262cae9292e16a96f6e8761eabb5b8f6724edbaa37fdfd44a8e49bd3f2d1868245773feb53cae438b2cbcfbb59cdbc523b4a3b28ef82d429430bbc110ac8aeae1313288797b05fb4f7d976e09f7e3496fb09b58c4aae6aeb0586c86a91a66fe1a272bb778147e69d0c50850804208e0c176fb7992396865bef1bb46baa0d9b6b8ca249ba43a", 0x1000}, {&(0x7f0000000140)="661f66140423f34be6cd734790f86cc7f5ec77f3e3ffe3e003d77e3aa2eda06706937d67ade1df21604654c55dc309878d1370", 0x33}, {&(0x7f0000001640)="b15f4015990dbb9296d1fa82db6a9bbe2f9c798b503aadac23d81cfc927296b45c117ceed9515610cd8aec4bef19db79a53e2bea5966ef7e2d00b4fce408c4f2a373e41d2ddb20c4db829efde4ff922bdaaea41842be31d189eac3ad2cca04ba768c0f3c3da50dd318ca5ba1b04354a11e73888a54569f54a9f2fe5d1e764d73e4eb7c606aecbbe3bc4770a3e6df5328ccf4c11f17d0d71d8949c9918a64332ca013c3d54552bc1ea04a1fc484fcf1e1d5e27ab0a16d2e5867752f6ffc54a99ceccb6ccface9a7835423acd136d3fbb2c19336d06f02eebb60f3831435e0ebd38a463f6e5e26cd2895370618760f3697fefd1fa6632da8", 0xf7}, {&(0x7f0000001740)="c3a2ce784a3f927b7ee327f8c59ef91c46acba84b1664dd6549e2d2b2d3360c8f13e05a97fd1985732f9623e8823fe8304599f1b86591d9b0253054d81ced7f84b71a7ec17368a767d6dca7ff0d016c14e5f8e322dec714745c4e5055efc26fa15e291a178317121a61a38cd1165d363f4411049e2d8b6e2b9504f0c454903f36a340f6d9183d4fa6e44610b647b6e56761127520a97cb462a0fec67dc70aa797d07865624bcdb2ebfab4845e7808cf8d02b7c45c0c393c4017e78c53190692e94dd03b2145a062c567866de1b71e393322a25992f6ebfa16e1f5ea517e91784df6de1e25ee694f3c6bf4aea08ea0bde8af21e", 0xf3}, {&(0x7f0000001840)="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", 0x1000}], 0xa, &(0x7f0000002980)=[@dstaddrv6={0x20, 0x84, 0x8, @empty}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x80000001}}, @authinfo={0x18, 0x84, 0x6, {0x4}}, @authinfo={0x18, 0x84, 0x6, {0x9}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @sndinfo={0x20, 0x84, 0x2, {0x8349, 0x2, 0x6, 0x0, r5}}, @authinfo={0x18, 0x84, 0x6, {0x100}}], 0xc0}, {&(0x7f0000002a40)=@in6={0xa, 0x4e23, 0x0, @loopback, 0x400}, 0x1c, &(0x7f0000002b40)=[{&(0x7f0000002a80)="07c50046f2e96e4944a7c7d9d2f82ff07196ddd6afcebd69d05cb1e9a017ee6db1bc9d40c7d0efd8eae46bc6203ae76bac930ba2c94f8ab666cf52e268404461aaaed7dbe413f8234193d940f0a7718b47ba90e2c286f1d86fea172c0463da9d5631c3e6178dbf3569d63bec79b53b230c046d3db4c1fc692b134f309feb35d18f7739df7d6407d154655a5679643466f2bb", 0x92}], 0x1, &(0x7f0000002c80)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x2, 0x100, 0x6, 0x1, 0x1, 0x5, 0x1000}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0x3, 0x4, 0x7fffffff, 0x3, 0x40, 0x59eb, 0x5, r7}}], 0x60, 0x40801}, {&(0x7f0000002d00)=@in6={0xa, 0x4e21, 0x5bf8, @ipv4={[], [], @local}, 0x5}, 0x1c, &(0x7f0000002e80)=[{&(0x7f0000002d40)="d658422d60b88f4c848b0659a537b4c017969fb9459614e55cb1f192531373083c203fb5dd93c0debe4e6975ea3df2b95914d4312d9578f023c81d20315b21735eb6fe725255b839d714c0816f95c51e2c9c1f58ca3ccc3f32389584ac2dce21ed96718919a9c355b000d0d88e77ea002fd1b478a56b9954e44cb4666e61", 0x7e}, {&(0x7f0000002dc0)="3d40fd36", 0x4}, {&(0x7f0000002e00)="60adfd86a242ef2b4d28a5be2dd6f119e42cda14b75c02036f8bc42290bb7141a3996fe8c66fabc27fc2ed2ba34ff6c6bab27e352706a3933513b85d7324d9f8dd00d8fe272755a91e06181d511a5a1dd2a560c26491d43400d994feacb5272fb02d1dd26eff83f8d64c0fdb9cbc02e1f32ee757d7bc", 0x76}], 0x3, &(0x7f0000003100)=[@sndinfo={0x20, 0x84, 0x2, {0x994, 0x4003, 0x20, 0x2, r11}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0x6, 0x4, 0x8, 0x0, 0xfffffc87, 0x8, 0x8a24, r13}}, @sndinfo={0x20, 0x84, 0x2, {0x6, 0x8, 0x430, 0x7c, r14}}, @init={0x18, 0x84, 0x0, {0x6, 0x5, 0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0x200, 0x0, 0x4}}, @authinfo={0x18, 0x84, 0x6, {0x8001}}], 0xc0, 0xa8ba2da9131baec0}, {&(0x7f00000031c0)=@in={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000003600)=[{&(0x7f0000003200)="7ef6699e7ba7b790dd0523d0da692caec470aa6dc376b1b6481e51c295eff8531fade80cdb695d5cef11095398cf7bdc7f09311d92f59a5d0d69f302f573227cf25d307d6333b7d25223911431a5d0e2240e5bff8d1eaf582e243d7c3097ed6e4af2f7782b420050d496fd06a3582c55a56c977905fa2e61bfd7e78720e132afb1dcacada9387216b8072a751f67402251ebe4e129", 0x95}, {&(0x7f00000032c0)="5156f0490b842737a44ee9751a113ed548e5992ed766339e7b0df61f9591ba19930b8c04a0b9a4d874c22276d77cb0c5916c2efd971b4adb4fbb617ebdb0ab1adb4e2c18f6c0af7c1a7f5829fb7af64a7e2c7b2fae456b57ed590150efd9a33fa40b2e276fa256b1b348d3cf19ca8f2de4b7c84a98de3af1990119bb3b2df56ce5a62c00a4e80069d4b6485bf9682369ab14aaa06d85d28d6cec39a9fa75643aac84838106c38e5f74020d792621eae34a48771aeec3366b2f0b180ca9d8eee08936a1ac460ab7c329a850f9ef9bf7bc9634bf", 0xd3}, {&(0x7f00000033c0)="1af13c6a819909ef484893127eb351ac4cb577cb967871007f90d7da3fbf188bd3fadcc40353f8edc56c1404da6c2ef89eab733cc1ab9f8eb6ab882885bb392d414462dba5af8e87ff55af18ca84998ad1ccd5f374b89f8f2bb65c535fbdedc7a63065d1d09fe7860394ce79c3388ce5f05194fecdcef726ed746b233345f95ce9637a2c6871f52ddb2fb0b8a457a2fb79bd4a29328b681f23c3dd1e8e3deb2670f34d52a2b04b4d943bff6de457ed810e9996d6679213f569563d2258e38376d1ed1d32ca0c4cd3cc5a04d8ddfef51934eaca15e218cc530984cfff87823132193720c6ff9a689bb4", 0xe9}, {&(0x7f00000034c0)="da84896859b56199a994b36169cce5ac077b1673b97b33d315146fa1513fdbe7f7551c9c3c399e24775c03674c38599c661683cc88ccbea8e8286d0c5e8cf9cbdd35333b07c6580d416787afbf188fa5180c11ffdbc2bacf3c4ec94ee6e5cfc6a4b652279b8c375a53d1f28ed8d3ecac1f6ddcc6df76386d6d79b3cef1ea8e43da7f9f2076570d117f7ad75a9dbb9bf9eee3a0cc08413c79e0f6ba8bf93eca5b6d3eca20938db264a28282330323144ae67bbed599f5ca4148c71c2239b6cf69232ff790ffe5b670c8792cfc1326a72e6a", 0xd1}, {&(0x7f00000035c0)="5c5d55f8542542bf0f45a46a3b4fa432f2eb6d765bc687431d4b8680088c4360702243cc65d1f26f92ad90fe27f62587e4cc80f3961964", 0x37}], 0x2a506ec59c1809e9, &(0x7f0000003680)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x9}}, @authinfo={0x18, 0x84, 0x6, {0x173a}}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @init={0x18, 0x84, 0x0, {0x6, 0xab, 0x3, 0xbce}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x2}}, @init={0x18, 0x84, 0x0, {0xfffb, 0x8, 0x7fff}}, @init={0x18, 0x84, 0x0, {0x400, 0x7, 0x1, 0x8}}], 0xb0, 0x8881}], 0x4, 0x800) dup2(r0, r1) [ 2383.550186][ T28] audit: type=1804 audit(1578781156.972:510): pid=21425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4076/bus" dev="sda1" ino=16648 res=1 22:19:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:17 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@ipv4_newroute={0x2c, 0x18, 0x331, 0x4, 0x0, {0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2, 0x4000}, [@RTA_PREFSRC={0x8, 0x7, @broadcast}, @RTA_OIF={0x8, 0x4, r4}]}, 0x2c}}, 0x0) bind$can_raw(r1, &(0x7f0000000040)={0x1d, r4}, 0x10) ftruncate(r0, 0x88001) r5 = socket(0x11, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000180031030000aba300000008000700"/31, @ANYRES32=r8, @ANYBLOB], 0x2c}}, 0x0) bind(r5, &(0x7f0000000180)=@can, 0x80) r9 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r5, r9, 0x0, 0x4e68d5f8) [ 2383.662415][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:17 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x5414c2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0x1dc0002, 0x401, 0x26, r0, 0x0, &(0x7f0000000000)={0x9909db, 0x3, [], @string=&(0x7f0000000200)=0x48}}) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000080)=0x9) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x0, 0x2, "27ae2fc8ba154037d5a2350264221ac528a94a6fe9695c54", {0x1, 0x4}, 0x200}) ftruncate(r0, 0x88000) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@x25={0x9, @remote={[], 0x0}}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) [ 2383.824930][ T28] audit: type=1804 audit(1578781157.332:511): pid=21655 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4077/bus" dev="sda1" ino=16961 res=1 22:19:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:17 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) socket$bt_bnep(0x1f, 0x3, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(0xffffffffffffffff, r4) connect$pppoe(r4, &(0x7f0000000140)={0x18, 0x0, {0x0, @random="c562cc7fc7ff", 'ip_vti0\x00'}}, 0x1e) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 22:19:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x2, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2384.006681][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:17 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000080)={0x4, 0x0, 0x1009, 0x0, 0x1, 0x9, 0x400}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) [ 2384.091688][T21872] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:17 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400100, 0x0) sendfile(r3, r2, 0x0, 0x4e68d5f8) 22:19:17 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000000040)='./bus\x00', 0x80, 0x3b0) r3 = socket(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f00000000c0)=@req={0xff, 0x4c47ca85, 0xffe, 0x202f804}, 0xffffffffffffff7a) sendmsg$NLBL_CIPSOV4_C_ADD(r3, 0xfffffffffffffffd, 0x20000001) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x3, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:17 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xffffffffe627dc98, 0x1a405) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet(0x2, 0x3, 0xfd) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r3, 0x80605414, &(0x7f0000000100)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) r5 = dup2(r4, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) [ 2384.347307][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2384.464110][T22158] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:18 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) socket(0x11, 0x3, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r2 = socket(0x11, 0x3, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000140)=0x1e) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000040)="aa7e4ebc8f366551c14989527a0af8a104d8664cd6b3399ff7f519ff582d27279c0666e0c7b89577050ffa7e0834545cb9393c307b82f1694be0bcf2520cabfe64385e715616", 0x46) sendfile(r0, r1, 0x0, 0x4e68d5f8) 22:19:18 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x38cfcc9b8d534a20, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e22, 0x4, @remote, 0xfe8}, {0xa, 0x4e24, 0x101, @loopback, 0x6}, 0x800, [0x37, 0x8000, 0x4, 0x6, 0x90b9, 0x4, 0x1]}, 0x5c) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) ioctl$NS_GET_USERNS(r6, 0xb701, 0x0) dup2(r0, r1) 22:19:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x4, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2384.624647][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:18 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet6_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000200)="911da8473e3f38aa9df16a22d4ce838690dbaaa631fa683ba2d001d0ab4b4873d474b277b0d355ddf488fb9d1b04870355494dcf87a5129f7b1b1227f5c667e393a4aaac8f8deae47508e1e7115bc4aafcab676673f05d3fd82c4843361ec6fae50d5e39de79597407cc31ac38bb904cbd7d1d1f843bfa5bebbbea7ae3cd59abf95c58dde8b3d9becb33591d48f3aa7bfa63a8c037641eccf36a2209d764ec34b2417b1563e2392af987f56358af6bc108509b0391e726ec", 0xb8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) 22:19:18 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f0000000080)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r2) ioctl$SNDRV_PCM_IOCTL_RESET(r5, 0x4141, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r6, 0xc0485661, &(0x7f0000000100)={0x1, 0x1, @start={0x10000, 0x1}}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) [ 2384.836232][T22493] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:18 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x17) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x100, 0x0) ioctl$KDGKBTYPE(r3, 0x4b33, &(0x7f00000000c0)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r2) getresuid(&(0x7f0000001440)=0x0, &(0x7f0000001480), &(0x7f00000014c0)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r8) r9 = getuid() syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x5, &(0x7f00000013c0)=[{&(0x7f00000001c0)="430667d8cd194cbbb13c3c2b298d87823838442cc69d4b0f4640572c3d8999918d446f3e9c034ca47660032a184a6360bfff5abe6ea2afa8490cd1b03974844983ced13760c15915fdb66e84a17ca2f0beda6e497824684f6ea924a043017ccd83937ede2e3768f0a918259bacbd323e5c19dc934af6460c82f37a9e5f33823d4288fdc1b15c632bfe12809e04a602ea7737499e2921d10dad6aa4abcec59ae4c0ea8e934df9c80859ee2ec769731de04eb1562004f10dfafd1717", 0xbb, 0x40}, {&(0x7f0000000280)="6119202a03fb9e661112c3f28fc7c891c08287825570e886684a1f4707495b4b5d48463efc578ba4ada3ccbd0555eb48c27dc016d4e7e81272236609486cda9f865fd11d7578a82e8c820464340ad3b871670145f91119fa8fdf23be9c4d1d04a0c3e829bfa6b43cb884b3d30da305e14262ef", 0x73, 0x100}, {&(0x7f0000000300)="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", 0x1000, 0x7fff}, {&(0x7f0000001300)="19483e7d00c3dbb8dcb5889d97ef542bd2e61a4a63389a03ffd523a71a325f04abc2a904904030574367f127e34c78237cac51a85d33c41837f7132572f4485abd947999e3ab8f7f56a6360c72c6f234d032f88ecdbad9a307090b6f090949e0e66a1f0a6f0cf575328b2f3fb584", 0x6e, 0xfffffffffffffffb}, {&(0x7f0000001380)="61ea9f449956f663add75b2030c68edea60ca4512f1c3815454bfb07c58435d61cabef537d3fcd773699870de000e8", 0x2f, 0xfae3}], 0x200044, &(0x7f0000001500)={[], [{@obj_user={'obj_user', 0x3d, '/dev/v4l-subdev#\x00'}}, {@fowner_gt={'fowner>', r6}}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_gt={'euid>', r8}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_gt={'uid>', r9}}, {@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, '/dev/v4l-subdev#\x00'}}]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) [ 2385.070227][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:18 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0xe541, 0x0) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000040)=0x7fff) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x5, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2385.223209][T22742] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:18 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x80220) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = accept4$netrom(r2, &(0x7f0000000080)={{0x3, @null}, [@null, @default, @null, @null, @null, @netrom, @bcast, @netrom]}, &(0x7f0000000100)=0x48, 0x80400) r4 = dup2(r3, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) dup2(r5, r3) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40, 0x2) 22:19:18 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2385.406779][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x4480, 0x0) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8004551a, &(0x7f0000000000)) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180), 0x1}}, {{0x0, 0x0, 0x0}}], 0x27b, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x800, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x4, 0x3}, 0x0, 0x0, &(0x7f00000002c0)={0x1, 0xb, 0x40, 0x401}, &(0x7f0000000380)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x1}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="180000007f00000000000000182b0000178adbfeadf1a7c2893b951bd903d280267dfe6b312367b4251cf8ffc549c2b8118e6d228bb7b752a394997e88595d1513414e13ed2ed0", @ANYRES32=r3, @ANYBLOB="0000000006000000ff250101080000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x56, 0x89, &(0x7f0000000680)=""/137, 0x41100, 0x3, [], 0x0, 0x4, r3, 0x8, &(0x7f0000000740)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x10, 0x0, 0x1f}, 0x10, r4}, 0x78) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=r4, 0x4) fsetxattr$trusted_overlay_opaque(r5, &(0x7f00000005c0)='trusted.overlay.opaque\x00', &(0x7f0000000600)='y\x00', 0x2, 0x2) 22:19:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x6, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:19 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x20) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) fcntl$addseals(r4, 0x409, 0x0) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f00000000c0)) r5 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r7, 0x10f, 0x80, &(0x7f0000000040), 0x4) dup2(r7, r6) 22:19:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "02040100"}, 0x28) 22:19:19 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$packet_int(r3, 0x107, 0x10, &(0x7f0000000000)=0x16, 0x4) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2385.684172][T23052] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 2385.907383][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:19 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) r6 = syz_open_dev$vcsa(&(0x7f00000007c0)='/dev/vcsa#\x00', 0x10000, 0x1) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000800), &(0x7f0000000840)=0x4) tee(r5, r3, 0x8, 0x1b) 22:19:19 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) bind(r2, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x3, 0x2, 0x5, {0xa, 0x4e23, 0x6, @loopback, 0xcc6}}}, 0x224) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:19:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x7, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2386.152774][T23495] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:19 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000200)="1c24cf6ddee31e98c43cc988aa5ca6871bb9b2308074fad63a23c490c7b960b566dc70d8611234530acb20049a95ee158abea11aacc56aa28b689bf88e180381a9166a8a727689c5e2acf99473947d7badd75e06323e0b5d76743e7bdf38b6ef21de62e6214dc052e00e68d8fb808566bf5b51a3d39b44f33b6e837c797d4e4b336f2b96af3994272d045a5ca9c2af67957fc6ec93694361d7eaba64fc7e453a", 0xa0}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000100)="f0bd05366b25972434", 0x9}, {&(0x7f00000012c0)="1fd2c971560525e8ee2648e66f7ec1353638e22c69fa1917f89081ab1cedef07dd4ebb27e7545852035493ec17f3ef01155b50a317392fd124a7e258b24968fe3de40431e34af456ed2e7bab2e5e8903a398ffecfcda9c67216e7bc952dc84079620582ee83944dd3f9d57ff446f275b1b6d14ba46b96c4d10b3178c6a000a98bf235b31340e11219987ed55d81f2b33582f5cc7e0260d16b8ed3c75b8873436c13fa6d7f3fa2b551dcbe90c7a2aca", 0xaf}, {&(0x7f0000001380)="a265c9244a39bcd801e5cabe1c55ecd36fcdee45ebedb576ccff44361f8c44d2100e63972f59e214ec05a09e37dce64f06930088ca7bdae76980e1cf8e8ad64b44fc2a72cdad9d7718be2be79430cbf9b3fe0966aa3333bae0f3221d96c9ede0", 0x60}], 0x5) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000000)={0xffff, {{0xa, 0x4e21, 0x1d, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffff7}}}, 0x88) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000001480)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) 22:19:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "03040100"}, 0x28) 22:19:19 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000080)={0x8001008, 0x46, 0x4}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) time(&(0x7f00000000c0)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_nlink(r5, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L-', 0xa49}, 0x16, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x35}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2386.392425][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x8, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:20 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x40) ioctl$KVM_GET_ONE_REG(r4, 0x4010aeab, &(0x7f00000000c0)={0x40, 0x3ff}) r5 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 22:19:20 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) setsockopt$inet6_group_source_req(r0, 0x29, 0x5, &(0x7f0000000200)={0x8, {{0xa, 0x4e22, 0x401, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}, {{0xa, 0x4e21, 0x209a, @mcast2, 0x9}}}, 0x108) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000440)={&(0x7f0000000140)={0x1d, r2}, 0x10, &(0x7f0000000400)={&(0x7f0000000380)={0x1, 0x80, 0x5, {}, {r3, r4/1000+30000}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{0x1, 0x1}, 0x2b, 0x3, 0x0, 0x0, "769019d2dbf13176b80ddab5839c1fb7fd2c1c1a0d3729c56e1844c68a8e4e5afac9daa5f9f401611940ebaa1daf15a240a8c91a08bb7e01f8b3cba5d6f99cdd"}}, 0x80}, 0x1, 0x0, 0x0, 0xf7768f789af57991}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$KDSKBLED(r5, 0x4b65, 0x3) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r6, 0x0, 0x4e68d5f8) 22:19:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "04040100"}, 0x28) [ 2386.649033][T23942] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:20 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x90000, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:20 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') ioctl$VIDIOC_S_FREQUENCY(r5, 0x402c5639, &(0x7f00000000c0)={0x4, 0x5, 0x5}) dup2(r0, r1) 22:19:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x10000000000002a7}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0xb, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "05040100"}, 0x28) 22:19:20 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4, {0x3, 0x7, 0x3}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:20 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) bind(r1, &(0x7f0000000180)=@generic={0x28, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) [ 2387.205863][T24387] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0xea04b67827f525e3) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000540)={0x100000, &(0x7f0000000500), 0x9, r1, 0x9}) getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x400800, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000380)={0x0, 0x8}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x40, 0x9, 0x1ff, 0x200, 0x3, 0x9553, 0x2, {r3, @in6={{0xa, 0x4e21, 0x6, @mcast2, 0x4}}, 0x6, 0x3ca, 0x1aa12f00, 0x10}}, &(0x7f00000004c0)=0xb0) getdents64(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x13f, 0x6}}, 0x20) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="980000000102000028997000fedbdf250300000368000a006400020006000300000400000c00020004e10100210000001400010008000100e0000002080002007f0000010c000200050001007a0000002c0001001400030000000000000000000000ffffffffffff14000400ff010000000000000000000000000001080009000000004014000a0008000100000000010800010000000000"], 0x98}, 0x1, 0x0, 0x0, 0x4d000}, 0x0) 22:19:20 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) lseek(r0, 0x8, 0x1) ftruncate(r0, 0x88001) r1 = socket(0x5, 0x80807, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) r5 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000200)={0x3, 0x7, 0x4, 0x400, 0x8, {r3, r4/1000+30000}, {0x4, 0xc, 0x20, 0xff, 0xfb, 0xfe, "01538d29"}, 0x1000, 0x1, @planes=&(0x7f0000000140)={0x7, 0x4, @userptr=0x9, 0x8}, 0x8000, 0x0, r5}) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000040)=0x8001) pause() open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x80000, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000080)=""/80, 0x50) getdents64(r7, &(0x7f0000000700)=""/66, 0x42) getdents64(r7, 0x0, 0x0) r8 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f0000000280)={0x0, 0x8, 0x4, 0x1800, 0x7fff, {}, {0x4, 0x2, 0x50, 0x2, 0x0, 0x85, "a60d184e"}, 0x2, 0x1, @userptr=0xff, 0x100, 0x0, r8}) sendfile(r1, r6, 0x0, 0x4e68d5f8) 22:19:21 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r2 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) setsockopt$TIPC_MCAST_REPLICAST(r6, 0x10f, 0x86) dup2(r1, r2) [ 2387.465923][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 2387.465940][ T28] audit: type=1804 audit(1578781160.972:530): pid=24589 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2366/bus" dev="sda1" ino=16801 res=1 22:19:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "06040100"}, 0x28) 22:19:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x3b, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2387.634491][ T28] audit: type=1804 audit(1578781161.142:531): pid=24609 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4084/bus" dev="sda1" ino=16619 res=1 22:19:21 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r1 = socket(0x11, 0x3, 0x0) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x5, @mcast1, 0x1}, 0x1c) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c6500000000e90000000000000000000000000000000000000000002a00000029b25b21f5465718ea8b3ce99ac0ef1ac9fd4e4120b41c5d90ddc5c3546566bbcaa4a5f9711a8f960bd6c8457e0e5a7a8fb8a8a4cbb0a9e5276bff83414d5e3aec62bebee4d8320202127940dc68156ef1d0757d98fa24171f92000000000e04826e33856e3e409351a76e000000000000"], &(0x7f0000000080)=0x4e) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000340)={0xffffffff, 0x3, 0x5, 0xfffffffe, &(0x7f0000000280)=[{}, {}, {}]}) 22:19:21 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) [ 2387.735913][T24808] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:21 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x6, 0x4000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={r6, @in6={{0xa, 0x4e21, 0x38, @empty, 0x1ffc000}}, 0x0, 0xc3, 0x1f, 0x5, 0x40, 0x100, 0x8}, &(0x7f0000000100)=0x9c) 22:19:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "07040100"}, 0x28) [ 2387.956522][ T28] audit: type=1804 audit(1578781161.462:532): pid=25030 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2367/bus" dev="sda1" ino=16691 res=1 [ 2387.996459][ C0] net_ratelimit: 3 callbacks suppressed 22:19:21 executing program 4: r0 = pkey_alloc(0x0, 0x1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000440)={'team0\x00'}) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x5000000, r0) r2 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xfffffffffffffffe, 0x400002) r3 = syz_open_dev$video4linux(0x0, 0x0, 0xcc943) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x50000, 0x0) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000080)={0x3e, 0x7, 0x3}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$PPPIOCSMRRU(r4, 0x4004743b, &(0x7f0000000200)) dup2(r2, r3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f00000002c0)={0x0, 'veth0_vlan\x00', {0x7}, 0x8001}) r6 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r7, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000001) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x280482, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x29b, 0x7) 22:19:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2387.996470][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "08040100"}, 0x28) [ 2388.113167][ T28] audit: type=1800 audit(1578781161.622:533): pid=25257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="v4l-subdev." dev="sda1" ino=16964 res=0 22:19:21 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x98, "f2007889c3b1274ff95f12966667185c7f8a472fb81128a40f9656387e9593bdd96110f70a8a8603b0e278d68584a3931bdfe8e80545638c8cdcf64b2d055b2f781257aaee8cd58abd29946d1ab44302038234a575d6c39e0296bee79b3108945349d3e5023434105bcd3899dbd0b434a743ec72460a70f1d27ec0447f831f06436ac20b14f0912077c6bb93ae25b2d534112d84368e8c65"}, &(0x7f00000002c0)=0xa0) ftruncate(r0, 0x88001) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000040)={@null, @null, @null, 0x27, 0x9, 0x6, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @bcast]}) sendfile(r3, r4, 0x0, 0x4e68d5f8) [ 2388.329462][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2388.355147][ T28] audit: type=1804 audit(1578781161.862:534): pid=25411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4084/bus" dev="sda1" ino=16619 res=1 [ 2388.460000][ T28] audit: type=1804 audit(1578781161.942:535): pid=25462 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2368/bus" dev="sda1" ino=16679 res=1 22:19:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "09040100"}, 0x28) 22:19:22 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) dup2(r0, r1) 22:19:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x2, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2388.592343][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:22 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x7, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "0a040100"}, 0x28) 22:19:22 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x961440, 0x0) ftruncate(r0, 0x88001) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x3ff, 0x12000) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x70, r2, 0x100, 0x70bd26, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={[], [], @local}}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r0}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}]}, 0x70}, 0x1, 0x0, 0x0, 0x400}, 0x80) r3 = socket(0x26, 0x0, 0x80) bind(r3, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4e68d5f8) 22:19:22 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000001c0)={0x9, {{0xa, 0x4e22, 0xffffff31, @loopback, 0x20004}}, 0x1, 0x3, [{{0xa, 0x4e23, 0x9, @local, 0x70d}}, {{0xa, 0x4e22, 0x7, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}}, {{0xa, 0x4e24, 0xa7db, @empty, 0x7}}]}, 0x210) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x3, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:22 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, &(0x7f0000000840)="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", 0x592, 0xfa9f8eb5ee87b6c9, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r4, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) write$binfmt_misc(r4, 0x0, 0x0) r5 = accept(r4, &(0x7f0000000500)=@ax25={{0x3, @netrom}, [@remote, @bcast, @remote, @rose, @default, @null, @netrom, @rose]}, 0x0) r6 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(r5, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="800228bd7000fbdb6e3602000000080002000000000008000c00f0711f9608000400ffffffff"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1080480}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="00042cbd7000ffdbdf2506000000080000000000010000000c000300000014000600fe80000000000000000000000000002d140006"], 0x3}, 0x1, 0x0, 0x0, 0x814}, 0x10) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x58, r6, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x40090}, 0x0) [ 2388.994875][ T28] audit: type=1804 audit(1578781162.502:536): pid=25873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4085/bus" dev="sda1" ino=16976 res=1 [ 2389.043284][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:22 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000080)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:22 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./bus\x00', 0x400000000000000, 0x1, &(0x7f0000000300)=[{&(0x7f0000000200)="de1c2dfda0798a3d758b0acb5146557bf9d8d039e52c0cb53fa4ccad94dd8fb1f636af60f462a8db25f95766d923e896539acf9fc8bbe2916ce66e9fb6604320d3f242be5a4ab8f8b1a8031207b2cbc649bdbf001f4f5c36fcf09e5a2809ee95db6c40a52268dd5958568692e5ec2be756763e6d606785980c21ba8807934989d6f61c25208239c470c82140f4920cbd18f075eccb0273bd75f2f04eeb468e346ed1863c47abd64dc7eccb2c382813975a57b1fd67980d6e3da4c54b466eed70ba53472a61b6bac307c870ee717fe1fd94d5fa279f40eb38d4f9f5478d5e1e", 0xdf, 0x6}], 0x2000, &(0x7f0000000500)={[{@balloc_border='block-allocator=border'}, {@barrier_flush='barrier=flush'}], [{@fsname={'fsname', 0x3d, 'task\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00\x00\x00\x00\x00i\x85\xca\xb4DihP,g\xb5\x04\xa0\xc2\xf5\x1d\xc07\xd2NJ$\xf4\xdf\xb6\xac\xcaVb\xfe\xa5)\xac\x85%_\xa7F\xd7\x01\x11PG@s\xf6%\xd1\xaa\xb7\xde\xfb\xd7*\x92 D\xf8\xc1\xcd\x8c:\xd3\x1c\xbc\xe2m\x877\x8a3\x9a\xebg\xf0|\xc7&\xcd\xed\xfb\"\x8fM\xfc\x8e\x0fe\x06\xe1\xf1\x05PS\xc6\xc7\xd4\x90\x87Q\x85\xa5Rs\xb1\x9f\x82\x14\xf02~\xf1\xa5\xe2\x9bR\xae\xb5$#>\xfeS\xdb\xf3\xa6\xb1\x02\xbb\xe2E\x7fS\xb4z\xc8hc\xe8\xc0\aW'}}, {@measure='measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x65, 0x0, 0x32, 0x66, 0x63, 0x55, 0x38], 0x2d, [0xcf, 0x65, 0x30, 0x38], 0x2d, [0x63, 0x34, 0x32, 0x35], 0x2d, [0x65, 0x1, 0x35, 0x30], 0x2d, [0x30, 0x65, 0x62, 0x64, 0xa2, 0x4, 0xa8, 0x32]}}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@dont_appraise='dont_appraise'}]}) getdents64(r3, &(0x7f0000000080)=""/80, 0x50) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) write$P9_RFLUSH(r5, &(0x7f00000004c0)={0x7, 0x6d, 0x2}, 0x20a) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000000)={0x1, 0x10001}) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "0b040100"}, 0x28) [ 2389.194215][ T28] audit: type=1804 audit(1578781162.702:537): pid=26119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4085/bus" dev="sda1" ino=16976 res=1 22:19:22 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) accept4$netrom(r3, &(0x7f0000000080)={{0x3, @netrom}, [@default, @bcast, @netrom, @bcast, @remote, @rose, @rose, @bcast]}, &(0x7f0000000100)=0x48, 0x80000) r4 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:22 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) [ 2389.366974][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x4, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2389.395604][ T28] audit: type=1804 audit(1578781162.902:538): pid=26185 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2370/bus" dev="sda1" ino=17105 res=1 22:19:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "0c040100"}, 0x28) [ 2389.583309][ T28] audit: type=1804 audit(1578781163.092:539): pid=26328 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4086/bus" dev="sda1" ino=16691 res=1 [ 2389.637705][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:23 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000080)={0x0, 0x0, {0x4, 0x10001, 0x2000000, 0x1}}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) ioctl$TIOCMGET(r6, 0x5415, &(0x7f0000000140)) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r5}, 0x10) 22:19:23 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10002, 0x80, 0xfffffff8, 0x2, 0x8, 0xfffffff7, 0x7}, 0x1c) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f0000000080), 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffc000/0x3000)=nil, 0x1000, 0x0, 0x4010, r4, 0x83000000) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f0000000040)=0x9) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:23 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x100, 0x202002) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000400)=@urb_type_iso={0x0, {0x9, 0x1}, 0x5, 0x810e9aa6f169693c, &(0x7f0000000200)="95a6f0bdf8a1766139084a12ff82e750b6bb371a739135cfbdd1e000f7689d5a1b233a025bde95f23abea41cbdc898a2f0789c24cfe33679619c40dfc2bdf42590847ac6c2f045ae75aa72217f47fc62986fd988d6e7fff6cc3828ca31ae83fd65389c6abb91b69af6b4700e03eed513ee2ddfbe3435f64c8813ea05c72a2dc1a6429ab854b3efc6f13b5bb4bda83f0de71995841c56b8d914748559a6c3a057eaab0b24f53340344ec13b6e9d198e1841126b304e479b452c5e942c89e56e18e6db620b02127acf908faec4ccafebb8fc727896cdde7f978f565130d83aaefc3f7982a02fb898f88637f5c09e3e", 0xee, 0xff, 0x3, 0xb, 0x1f, 0x100, &(0x7f0000000300)="62409213491e76b49cf67e5deb513290712f48a4be6140bb32f998a44f9dd712d49c77ac42a9f26c369be4ea3897a7ef4b05bbe4831db8bd52acf75318590aa73e78f8f722b73f69ed31a8ed52af7a28ddc581fc946462b04d2eae542d829813ec3187396f58b26968665eb7caf2e7acbe11e37990a56748aa0b383e36fdb36ada0f3cb4f750ff38dd506977a574b4a9ed25bce14202e0269c07bff46c2015e8914764158aefb8ee7dd925642eaade258b4d3dfe21e619e16a150ef4516fe4c103e963fefb84e9920959d1b9946bb81c74a1e9caf0ab2a3bbe91280751300d0b5fd3dfb65414009cf8d392b269677bd8e64f42e596", [{0x0, 0xb6ea, 0x7}, {0xffffff81, 0x9, 0x9}, {0xe879, 0x4, 0x8}, {0x101, 0xffff, 0x539}, {0x2, 0x200, 0x8001}, {0x0, 0x81, 0xac8}, {0x58, 0x8001, 0x6}, {0x800}, {0xfffffffe, 0x5f1, 0xf09f}, {0x9, 0x6, 0x4}, {0x6, 0x5, 0xffffff17}]}) 22:19:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "0d040100"}, 0x28) 22:19:23 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40021, 0x0) ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f00000002c0)=@urb_type_interrupt={0x1, {0xc, 0x1}, 0x8, 0x80, &(0x7f00000000c0)="923b9d3345f8e95e94f239d5d1a2f6878e5985eeb6712b22908800b85e9c1bde14c94a52e9667968ae4775fcebabdc1975776ad83cdf37dc73245ea3c1bf0145cd4b108faef9c82dc32ed4e14796ee053cee8b5e45bcf0432fca44ebf406fd0bfbd8bf005a49f5b66badeccf085a8d481ed5d1c53c03d20c2cb1be8e914d5decde55eeb269f0f1f3f992020195ad18c91ba80c081f48b53117a5834568df", 0x9e, 0x7fffffff, 0x5, 0x0, 0x0, 0x2, &(0x7f00000001c0)="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"}) r5 = syz_open_procfs(0x0, &(0x7f0000000300)='net/ptype\x00') r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000340)={r8, 0x3}, 0x8) r9 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) dup2(r0, r1) 22:19:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x5, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2390.084966][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:23 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./bus\x00', 0x7, 0x3, &(0x7f0000000100)=[{&(0x7f0000000200)="c9e30c486b9cad252cf2788db799ea02219cc3027f4c2c84fbe7cbf0250ebf95a46d4072dea91db7c97d4729a035d02d94e3ac31fa3098800c27118d47ecd5ff0ca4b5a848cd5c6a615a27a22794613f1b6a4d0cf5f48549106f23982321160f79f3646dee3e1a78be7c443e361c31ebfb46b2cb14ef253dc636644dee273f3f1ecf0fc13b7808365c3a7d950423c224614095384f263ac97c7a1cf5fdc4804d3803c03da9100260bf32ab56fc16b03bff5d849e39", 0xb5, 0xa8fa}, {&(0x7f00000002c0)="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", 0x1000, 0x7ff}, {&(0x7f00000012c0)="3ccc037750920295c5ebf88b0e184b18ec05a3852a8f84558ac2f3357adcd5e2f5a075e629bde13c9d21cd39fd398b57a9fef0c0e4191f4ec4705b74f35f7d4e9f351c124254beaff69a999e8f20af17bd93985fee90cad4667c49d368cd6ca65d636e7027165232c0bc6871a1b98c88061b30c4b736215bf475868014fd50f05faf3898f16ea0f5193ba0b45385d8b4d45685c0fbf755287dbd42043d78f7325a44a7591f55fbc2dea630610442f97d110344f1db4eeb78ac11cebf55e43508cdf37a082bdee4728a30a2eae92ea615ce6896f4c08f21a100bf0890ca12f94fa0c4e9c346ad80", 0xe7, 0x1f}], 0x2020, &(0x7f0000000080)={[{@utf8no='utf8=0'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '*selinux'}}, {@audit='audit'}]}) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "0e040100"}, 0x28) 22:19:23 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) ftruncate(r0, 0x88004) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000001880)={0x3, &(0x7f0000001840)=[{0x7, 0x80, 0x81, 0x20}, {0xfae2, 0x20, 0x1, 0x8}, {0x401, 0x2, 0x85, 0x3}]}) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = getuid() stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r6) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f00000016c0)=0x0) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./bus\x00', 0x1, 0x7, &(0x7f0000001540)=[{&(0x7f0000000200)="7e0db0fd9e8798ea3722d727ac24a8e8e720d458385c18b55887a4deb7a79ca7af27a88ab082af1aba06e31d85a8059915cdef058a83eb7ba41187027e72fcd7e6a6a6c7ffda74dd1090d33535b93d2e0c94e74d7eec6e52cc1d69", 0x5b, 0x5}, {&(0x7f0000000280)="85a59dbc6eb1daa9c309b5c0ad14d34d5618f92ea569b65f3b0b55ccf309685767430fbd19d875237df00eb71884970bab8acdf53bd17fac00adb566a0d18c044869553023432ca76977d8f8ba99d3dfa261391eee168fb63176c0b618c171a5c46e72d2b61d3256704f1ce0b3be9728a0942b42c23a4c706d5f0eca63660b", 0x7f, 0x7fffffff}, {&(0x7f0000000300)="b26c4183086c1f8a00ba4ef06958653908d72bcadcf1404185cbcb", 0x1b, 0x1}, {&(0x7f0000000340)="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", 0xfe, 0x6}, {&(0x7f0000000440)="a1437ffdea27f2c6d2fc2fb82410e23ba8f1c89faa7e92202a97e6ec4546449eb3311b9bcb5ae7a83d2accc2fedf74bab0a8bb52c9611dc4e200f55bbe10b4d299b426c117b6d0f26d4ede45aa26fc852ef84f953cd273c865ff304eaf686138abfabb474591f07f67c3f71922b9b15b72edea44183865a984c5cd4da51b964935d309815fe39b5a511df28bcab0c74890", 0x91, 0xa3c}, {&(0x7f0000000500)="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", 0x1000, 0xfff}, {&(0x7f0000001500)="0b38a04d5457a79000364a842f626a59a960196036dcd09bf72262a9373a9d113a4224f9fa5773950c0ce5", 0x2b, 0x2}], 0x800000, &(0x7f0000001700)={[{@nodots='nodots'}, {@dots='dots'}, {@fat=@errors_continue='errors=continue'}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffecc}}, {@nodots='nodots'}, {@fat=@sys_immutable='sys_immutable'}, {@nodots='nodots'}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x7}}, {@dots='dots'}], [{@euid_eq={'euid', 0x3d, r3}}, {@fowner_lt={'fowner<', r4}}, {@dont_measure='dont_measure'}, {@uid_eq={'uid', 0x3d, r6}}, {@smackfshat={'smackfshat', 0x3d, '()\\'}}, {@context={'context', 0x3d, 'root'}}, {@uid_gt={'uid>', r7}}]}) accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) truncate(&(0x7f0000000080)='./bus\x00', 0x20) 22:19:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x6, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2390.428617][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "0f040100"}, 0x28) 22:19:24 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x804000, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5fc) 22:19:24 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x81d) r1 = socket(0x11, 0x3, 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./bus/file0\x00', 0x100) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7f5bed7f, 0x200) open_tree(r2, &(0x7f0000000040)='./bus\x00', 0x0) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./bus/file0\x00', 0xffffffffffffffff, &(0x7f0000000100)='./bus/file0\x00', 0x0) ioctl$SNDCTL_DSP_NONBLOCK(0xffffffffffffffff, 0x500e, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f0000000140)='./bus/file0\x00', 0x8001, 0x20) sendfile(r1, r3, 0x0, 0x4e68d5f8) r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) ioctl$sock_bt_hci(r4, 0x1000891ab, &(0x7f00000000c0)) 22:19:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x7, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2390.861925][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "10040100"}, 0x28) [ 2391.116480][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:24 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c000000180031030000000000000000020000000000fe020000000008000700ffffffff08000400", @ANYRES32=r6, @ANYBLOB="02c46daf68649ea7dc52791c22eb8987f92c8414bd94bc22d5599bbac94dd6225681378cddb4b6e8bd3f80a61161361727209d0132c8374ab0ffc13bd2e36846a6a4795cfed1f94faa4a8457ac97e712761d0067dc62fd804b06b6d621330988719e0b3eeb90c966630639679685ae00"/121], 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vcan0\x00', r6}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={@mcast2, 0x18, r7}) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x4e68d5f8) 22:19:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x8, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:24 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x3, 0x8) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) fremovexattr(r7, &(0x7f0000000240)=@known='trusted.syz\x00') getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r8, 0x0) fanotify_init(0x0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x80, 0x0) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r3, 0x80044dfb, &(0x7f0000000000)) 22:19:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "11040100"}, 0x28) 22:19:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "12040100"}, 0x28) 22:19:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0xb, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x3b, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:25 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@in6={0xa, 0x4e24, 0x6, @loopback, 0x7}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0xb5) sendfile(r1, r2, 0x0, 0x4e68d5f8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r5) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x10000, 0x0) sendto$unix(r7, &(0x7f0000000300)="406fdbbf0ab4983ba9bb844a22bbc11bde46423100b07b827d8dfbebddab1c52798755b0703ad850c905d0815baf189ecf2a15ca218362dbb9d194ebe23cdb71998463807b1438aae1d1c281d9969daa66c3154aa3e57eec2bee66dc45bdd00aba01853b1fa40a51fd57fb7364d4befa26908d1a3615698a50ea00a80ffae1d2e4985d3d0e391312cd8c0c9f04a30da158cb8daa9d959109cd35df19cc5ff32102f93c46acb31838d9886f362db791c0de4f2f76a3b3e6a207ffce844f0628c611b49ffdda376fc0f10b9a1ae332ae1cbb74feb7dea87b78c8ddbda67914666711c2ea0a024df669beec923eaf581380e33d4506d0e56321bbd45d0cb37a7afee351a662f4af52725ec1c495bddf49a7667d69e73e07b5cac3409a3caf2fc29fa02272cae1cfaf2e18076e03c1efde2899b8a51f309ccc1ff9360b9aac49cb23ce16a3b4a5e80fbe1534b45e6672d2946c8b480f53d8bd26fc52c98f594fecd1f1b51dc4ec8bdbd1b46d2a67090b0d1a8a73ab3ca270791fdca5a4292c98cf6489b4caf5ec2b7b69e614bdc92817eca4f144d0529e5813bf892d6ec3e0ebed8bc7fc0099ee2567f4ab726bc50c2428af7b8bfafe4556452457bc14494e1265c5e11e064957afa4315eb56ec4dc1b4a0b88821708377628b99940d27eea919ca79a26cae14bf348fbfa474062a2c2c6aa08add0f0fa281670b603cf7bdb3e54d20fb1bdf79e62265224c705daa5cc80f03ce42add8a47819294c8af80dbeb407d6fa32d5dbfc12f99fcefabc2f02c8c427f045f79226cae4daa28eabc91641426ffa1b4da3d388c1257856060caec5b6c5860fe394d26197f263248b44dee6a1203484a52c4eb1367e2819ceb4a1a6bcb1733e61d74680d585fb0580812265e87a2e0231c767bc04324ac27ffd844379e8f9f7eeb794f06343a7bffa0050489862955c54b67d602f5904bae47597e96544edd46a37f6c1292e3114fb183dc2fe3b101c71aa24fa7427c5230791d0d0c8b566e383d5fc13af41b5f5e7ebebdee2ea3e5c026414b89f546a6dfd721f733f47327d16877ddfc1531d9610cc196e4c8a344f47ca41261eff9263afc336dff32223e2761ab84042d52f24b55e1cd9292a4dce10515fa07729e2ee293b28908fcf26d5b0c063a39f777b99625d656949e05690f61c619d66d3a3c669a15a4e4f86345a884bfa15947e7b59114db44eb3fbdfec2f3e8a0997741ebc805939795d0906d30895a79b5d6a77cbe4b1b0dba0bed8afec8ed2497255fcdb319f7f14ff73f47ff54b9429aba793046d448a46805b5335323d3890d1b69efda6612d798f6117165182325fdff475ada0897464f87096ba1332f5a3ec7ff0d7859bd90f7ba565c3d6a8b1b6f83e8207b5c11ed71963f20632568da2a2109d9288796aa61df7374385e7e540a1223b469c0c30e82faf073c1bf8eded1a7889c9f6e31e9455f539e4339d3ea37b8ac0d6f880f9832e05028877f114fb562e3c1b627702bd91b14bce4197b3db4a1b371accc254e30a222bd4fa6ff4e36343eb71c38e79d019d4cd65a098add8a8d710ab842d96977f3a9213d47e7e5f37d0eed9036e15b352823e8db4d3a6a322d40f16ba3f0d4140574bdcaef4a8913b1c5523eae78a74f3a104c0320359c71414d4a8a447e0c174f99f3213d8d4555f23fda9010c1a411c066b36ca14aed08334eb1a327557cea9c3f5cc42903378cdf80e3452523021167baf088169b3cb39e7758158b7f1b18999a7a78b3e54c5e9430102054a1488b0135bd0bdc746e0f659d09792d8b1f318a3538bf9f3580499b5dd2fcc33e5963d1d83717412ca070b5b9d74d224b60ccf6611bb8e5897a2db30adc878d951b23884e8965e6404b44d1c1423f74e55e597c01d4e225640433fa479248cdc45843a3caf325c683fb64670ea0c4ddcecb66a4e24053ff1bebcd83b4ab07ebafd99c9931d183e8ccec1346705a42710474edda0405edf04842dcd15c22841d2cf8d00772cfc9d12a83808a6b5b7815050c4654a31faeca390c09ac7eb3e59fe962047b944178e1dee78d3ca7d0ee6b55ace3cebf29a75441e4654a1f16b637bfeb4d7a096fe51fa3b90d335b3e2e6132dd0efef1b8b9763a3362136c2a720d7dce1257e099cf31f57f06d8c477e469f90a4e403489e1de65818a7854776f8b04241642fc9b51e3c4327f91f538db93098ee06c3c7a6a469b6a6770c232300ab3421a23539e854301f9fe15d48639997b07b263a8b2aecec16b6d4eaaeac9d51f463eccf13a33617a6f1757afb1530bdc465234178bb3b4a555a3ed04ad0ef5c7142bba42257a26e952a3799124341683e1b9edc2b9519438814ef6072782b39cde900296e91e692dfce38f4208efa96c5d9bf3c4c176c81f60b8bf4187945fb207aa922bfe2938a8c39a7bb736f5bf096056ae9cd1885fc7d2659b293707cfc78ad506b69a76e1be7412a53b8ab9a70bd4f0c237d45e2fa8b66bd38699eda60882171f4bf5d8ef12ac74b05ef66ef01a951dab4b02d75c774a7246b25588a60e0acbb5f4a02a2ccc6eb5d82af89fc508eec0559ec1c4541a5012ff743b5dfe951af59b5dc59006824f09dec9d8beb026cbdbb49ecc526a90608d2f26f5dbdae20608e721b38f223dd0d00a57241755f550d17405b0d969e1c40a742aab7492653f182a6b2eccdf54160a5cc452cf5956930b8cd5fb0b03a11606ae5618b1ca32a76a087628a091e07d531038479c6712f65b91d6790f836d61f72a228ad5b301af0165e7ea88fac483c8c65f0665632a18ab8cd27efe442375474e27be22a498a5fa88801fb9544bda19d5f66ca80c44b464da0ca38bbf249b456ec8c0a8e6a0dcdb639101a589b32941d72ffeaef3b24ed7bb3ef9c012fc1c58f363439658531f10b2edc3e3b64304871917a0c1dd52f2d98ade9cf56b1031b9d4efe1305eb15669cac583e0670e28846d3ea29c90dca419e753173ccb39e56275093ce63b7e3822bc4e6dfd48ea963852a60b5ed5e430473c700292f5a4c7492581c7af1b790c93ce0f56949e9c605500ad053e7d2046ac55a4d574684abc87cd8ef55d829c70b75e2b5a3f0dfd9f2cdb348fb12cd1e40b12bb25f661fd4dcbfefa021cbbae50c34ccb0ada8af284b8a6db7696b2fa54e318f09a9e2e4f6870cc736efb2c7756d2eeb24ca4e797c6efd8725bd5a6865292bc41d1b4f2d69ad120fc781f45ead4b7fac32a0db8bb072b8876b86a14443bcf9f2407cac4e96be9825ec35d61fa5de102ba683268d696970f295903a0b8a9cdad837623ab89a9a0b1511e70886728f99025557eb4e022d7f55fa9883b32a118a19e24b2881e79fc0a062b48a512f4c364dc2c064e77ae95c16c782d00d19ce46ebe26c974925cddeaa72eb16de0b0e53cdd9b2e5e6359a0731d208cb80a3a62318fd4abafeeae60ca3b0b04d49816e1091a35dcf7b8539b50a64ca6834e7825552a7dc5cf6d8bce52d010699333dacc2cc64a483331cd5722221257120c80c5c8fca573bb4ffdf9e2515008fbf1127f4f46bd7af3445ac4351f43c852c083e3a7eabe5045fe9e7445f02425074df05b09e4e163956f2aab0a6898df313c45668d73d3ad7a19b3324e124c6b6cc445a0b689ad028f48b2314889c427887aa6e9b380b8ac55de1de4bfce4bfe9b46b2314ecc3dca6e85a27e961dfa2bb53dcb020533b014a24f25909fb6078f29180d04a9a243ad66b25f502b08b51efbf4e9af025e9d3f026ad0a1f90402d0801fe14ed132a2dc0d791a76f48b690b045fb93ac4d8d2073e901d2e90554d7e3d0e740427b56f3cb9d8721b9f6cd89be078b1fd3521560015dc1bc9a48c8c8825bb713474c228c5b066a5dd755e2fe64ec47b173d2e593fecfb7bf2d8e9d22ed01fa04ed41e9143101ca5fda7e790ce28419d672425bb26c4afcb28532b7cc664c377e20e0229cb4de52a79a9d4a251f7ec5903162fdb4260e23a28a60c85548e82ff9131984e5da0ffd25a0dc4a9fe66c0a75e915128db52f7b97fa5b785f09fdf4c949c0024a0441ccdf5571ba3f285edd96f7320812fa10957c37b0e3d3f1589f4c6c62f4169d0a97bad0757201cd364e7ad29b16d0897d19be2afef66171958d5eb696a9005159902e0ca5307a3882aed8fd247554d65b719ccc713fcf2722c58495f195686e76167138d39de89b1df2615a24c68f85a33d47d22cab57eaed43b16da6227a578c471dc351cb98c59c19fdff39b8c9d580c439085a3109cc6feaab7f4d85db7a3469cef10f9768a380a81d2dda9c94032be7d6f39b3ec64663e23a7825a01b2de184a1ccea0d2ff14dde8cc0d8cc8f838d8b47d4aba3e3584d2b885c961770f742e3a5c4ab86397610e47c78ed70c09ac9df9b4ac5ecda5f07840f7a54fcb1b20acbbef9ee87fd7b022c2f47e5a506a9ee39112e67b41ab407549e2545483169fccb4612b14ee6e7b5aef823a99ddbc8284dbcac053c38de019059e37d7b4fc514903e46b7417ef91bf42896b2217e5e3327ec1af1651a3e93b5c3b5c0f12c4d30835afeac13eb22f3e2f5d7d102ef8d60df107c995c907a1bee4d0b8e6f9ceaaba840085d8e9b07297843d7477a12a0f49656ae038ed3aac3b10701295779a177382371cefaf14fc80396e90c6e09c47c1742c445d78b498ad0fa9874de58318a5d91cdb124fcddc183c58c8d95b178ff9e1efa85b29f7bb85115d8e3652785fdeb629dc79a08cfa00e9f6b422a0640bf02013461de634b6025c1ce61f1a1c26529ba19c3c2cf6e68de0651c607590caebd50f1b1aafe49a2704d1f7a8269d4fc95c3be688cc399799795f112f97e4f9d9f45b6db0697cf07aec211a88f77dbb55dee98f6a522a4e887796f05fb206f30bc9a99bf065b6cedd53df8990c25b02b128d5dd5208d791c2aacf5cdd3fb3ce2acbb1be2701543b2405f58dbe79fea252bbf95eeab19c6c896b0e8225ef91a0459c34f0ecef03094883eea8057db7c3122930bee8db756599cbe2b867e3dd5130404a4b19e1214154ca9988e74dc7fdafd4026622e72994bfc2b2f5f04540b6ed22fce79090fda2182f17bbf07ed3db00d5170c62e882b85b6504f81ad4aa84a26f3bcdec16668ba4b7decf11da44aaa7df300cbda71f3f38d43ac5af604ddaa3c1d55488a093340a3563bf1d1354a91507a4afed1ac3c183f4125dbfa15e760446a6f524be510b501e42c0893e0c1233363f13d148cb8b38427af82792a41ab5098a475c0f42a38e7f1ce6bb7ad2b3affa67921bc815d890d2d23ad9fa613e93c30e511efe484ddaa4fe24e0f4de7f828cf6c6ac957daf2aa73f8f6a7afc827e1c7b4c227791b67128a3e5362240dba42908a807db80c24cd1ee11bfeb61ea42d4d847108bc4b0c1d527f1ca2cb6e587df2a0c89cb106070b148a9b6e023d4efb69d972f2a88e8788f7a98eebef0fa3beda8d4d14103952655a48f5c1b8e1c406bb64ff99d94bec8cc779a70b5eb1e07da8c2a7c0012e7c41348a5afae22061fd4238e84723fcc4ee15c87ab3278f2b4c09ce7a4567cac7163fe3c1a35a24e8b05b0ffd8e4d549d3e08248af37003d2c2e232095b1b851f546d26561ee49fc33467d5cfa05fecde855289a1343b8f6b657a6c67452f6d083f39b7c5c4c45be88bf16824100623ddd62c97a60774a2a9bcfaa971d5796e2c639b62dbcc4edb874def9a62f2986f89b4cc2c886e736516067ace69f4cc51a2d081802983c154ca44dc5f90dbda95e162b5a7ed31bed121217b12b4fe71d865b913104", 0x157e, 0x40000040, &(0x7f0000001300)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setresuid(r3, r5, r6) 22:19:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "13040100"}, 0x28) 22:19:25 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, r1) 22:19:25 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r5) r6 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="fa288fd735b68b38e085ba", 0xb, r5) keyctl$setperm(0x5, r6, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:25 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x26100, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r6) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x3b, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:25 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x3d, 0xd91c524e3d32d9c6, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "14040100"}, 0x28) 22:19:25 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r5) r6 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="fa288fd735b68b38e085ba", 0xb, r5) keyctl$setperm(0x5, r6, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "15040100"}, 0x28) 22:19:26 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r5) r6 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="fa288fd735b68b38e085ba", 0xb, r5) keyctl$setperm(0x5, r6, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:26 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000280)={0x3, &(0x7f0000000200)=[{0x3f, 0x0, 0x3f}, {0xff80, 0x3f, 0x1, 0x5}, {0x1, 0x4, 0x6, 0x2}]}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/75, 0x4b) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) getdents64(r5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f0000000100)={0x9f0000, 0x5, 0xf8000000, r6, 0x0, &(0x7f00000000c0)={0xa30904, 0x80, [], @string=&(0x7f0000000080)=0x7f}}) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000380)=""/88, 0x58) getdents64(r9, &(0x7f0000000700)=""/66, 0x42) getdents64(r9, 0x0, 0x0) getdents64(r9, &(0x7f0000000300)=""/87, 0xfe21) getdents64(r8, &(0x7f0000000700)=""/66, 0x42) ioctl$TCSETA(r8, 0x5406, &(0x7f00000001c0)={0x9, 0x905, 0xa7, 0xb, 0x1}) getdents64(r8, 0x0, 0x0) openat(r8, &(0x7f0000000140)='./file0\x00', 0x141002, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r10, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r11, 0x10f, 0x80, &(0x7f0000000040), 0x4) dup2(0xffffffffffffffff, r11) 22:19:26 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) llistxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=""/76, 0x4c) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:26 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "16040100"}, 0x28) 22:19:26 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r4) r5 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="fa288fd735b68b38e085ba", 0xb, r4) keyctl$setperm(0x5, r5, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 2393.005051][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 2393.005068][ T28] audit: type=1804 audit(1578781166.512:552): pid=28905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2377/bus" dev="sda1" ino=17279 res=1 22:19:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x2, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:26 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x6f, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000040)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 22:19:26 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r3) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="fa288fd735b68b38e085ba", 0xb, r3) keyctl$setperm(0x5, r4, 0x20000) [ 2393.206656][ C0] net_ratelimit: 5 callbacks suppressed [ 2393.206667][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:26 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) 22:19:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "17040100"}, 0x28) 22:19:26 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x9, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x62f84de21fd70f84, 0x0) bind$netlink(r3, &(0x7f0000000240)={0x10, 0x0, 0x25dfdbfe, 0x918cd35ecbde0ad9}, 0xc) r4 = socket(0x10, 0x80002, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2800) ioctl$DRM_IOCTL_INFO_BUFS(r5, 0xc0106418, &(0x7f00000002c0)={0x0, 0x495, 0x9, 0xa21a0, 0x10}) r6 = fcntl$dupfd(r4, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) openat(r7, &(0x7f0000000040)='./file0\x00', 0x80c60, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r7, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r8, 0x10f, 0x80, &(0x7f0000000040), 0x4) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r9, 0x84, 0x3, &(0x7f0000000140)=0x3f, 0x1) r10 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x10040, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r11, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r12, 0x10f, 0x80, &(0x7f0000000040), 0x4) r13 = dup2(r10, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) 22:19:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x3, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:26 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r3) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="fa288fd735b68b38e085ba", 0xb, r3) [ 2393.534381][ T28] audit: type=1804 audit(1578781167.042:553): pid=29242 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2378/bus" dev="sda1" ino=16770 res=1 [ 2393.610531][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "18040100"}, 0x28) 22:19:27 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r3) 22:19:27 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0xa4, 0x5da0eb0f9570f5d4) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) r4 = msgget$private(0x0, 0x1) msgrcv(r4, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00@\x00'/15], 0xf, 0x1, 0x1800) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000080)='ppp1em1mime_typetrusted\x85$*em0#trusted.vboxnet0#\acpusetvboxnet1\x00', 0x0, r0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r1) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000080)=""/80, 0x50) getdents64(r7, &(0x7f0000000700)=""/66, 0x42) getdents64(r7, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f00000002c0)={0x120000, 0x4, 0x4, 0x10, 0x4, {0x0, 0x2710}, {0x1, 0x0, 0x7, 0xfd, 0x81, 0x4, "f7a0de27"}, 0x40, 0x3, @userptr=0x8, 0x9, 0x0, r0}) r8 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r8, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r8, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40040000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0xff78, 0x0, 0xd5c4e580cc2bd8a5, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, 0xa052}, @NL80211_ATTR_P2P_CTWINDOW={0x0, 0xa2, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x52800) 22:19:27 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, 0x0) 22:19:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x4, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2393.863808][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:27 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x3cd042, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000140)={0x8001, 0x1, 0x7f, 0x4, 0x7}) r5 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f00000001c0)=@req={0x1, 0x1ff}, 0x10) accept4$llc(r5, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x0) r6 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup2(r0, r1) 22:19:27 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x3, &(0x7f0000000040)=0x4) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:19:27 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, 0x0) 22:19:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "19040100"}, 0x28) 22:19:27 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x40) r2 = dup(r0) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x20000, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x11, 0x3, 0x0) write$nbd(r3, &(0x7f00000001c0)={0x67446698, 0x1, 0x3, 0x2, 0x3, "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"}, 0x1010) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r4 = accept$inet6(r3, 0x0, &(0x7f0000000080)) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 22:19:27 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r1) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, 0x0) [ 2394.274621][ T28] audit: type=1804 audit(1578781167.782:554): pid=29717 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2379/bus" dev="sda1" ino=16865 res=1 [ 2394.324490][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x5, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:28 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) 22:19:28 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x8, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) syz_open_dev$tty20(0xc, 0x4, 0x1) r5 = dup2(r2, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r6, 0x4b6a, &(0x7f0000000080)="1d2a3fc24331374ec1b555b6d1d8de4f7e95b1c540b7ae411a11c9c984884ed884b4d29f58d8fa78dc82a70440eec155b0e47c37b092d71d1c425df0c92690f2af6aee613e47c5551cb34e1b7754d04ee13aeabe6a1a1cab19c6c9d0ef6f3a3c67a74c9e032b61de3b82984c6cff76136a0bdfa7839107339e44d8efd5a91c8ae0a41ecc353942aacfd24cd6cebc85266082e0cc2027bb4a665dd84379edaabb6e65e8c0415582cb4cdf246549aacb8795b5bc92e24665ed1ba007b405fddc80f6e2968460") ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 22:19:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "1a040100"}, 0x28) [ 2394.651660][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:28 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) 22:19:28 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0xa, 0xc502127f09e03879, 0x23) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000000)={0x6, 0x11e0ec976c975dbd, 0x0, 0x7be47889, 0x7fffffff, 0x0, 0x6}) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:19:28 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0xfffffffffffffbff, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000040), 0x4) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r4, 0x800442d3, &(0x7f0000000080)={0xff, 0x1, 0x9, @broadcast, 'xfrm0\x00'}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, 0x0, 0x400000, 0x0) dup2(r0, r1) 22:19:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x6, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "1b040100"}, 0x28) 22:19:28 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) [ 2394.981470][ T28] audit: type=1804 audit(1578781168.492:555): pid=30202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2380/bus" dev="sda1" ino=16973 res=1 [ 2395.088387][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:28 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) syz_open_dev$video4linux(0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x7, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "1c040100"}, 0x28) 22:19:28 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:28 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x800) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f00000000c0)={0xc164997106aea35, 0x0, 0x103, 0x1, {0x800, 0x44a4, 0x7, 0x3}}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = socket$phonet_pipe(0x23, 0x5, 0x2) accept4$phonet_pipe(r3, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x800) r4 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000140), 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x28, r8, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}, @NL80211_ATTR_FTM_RESPONDER={0x8, 0x10e, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x4}]}]}, 0x28}}, 0x0) r10 = socket$inet6_sctp(0xa, 0x801, 0x84) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r10, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r11, 0x0, 0xffffffffffffffff, r10) ptrace$getsig(0x4202, r11, 0x8001, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000001640)=0xe8) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r7, &(0x7f0000001700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x38, r8, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WDEV={0xc}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}]}, 0x38}, 0x1, 0x0, 0x0, 0x2200c0c0}, 0xc5) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r14 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') prctl$PR_SET_FP_MODE(0x2d, 0x7) getdents64(r14, &(0x7f0000000080)=""/80, 0x50) getdents64(r14, &(0x7f0000000700)=""/66, 0x42) getdents64(r14, 0x0, 0x0) ioctl$TIOCNXCL(r14, 0x540d) setsockopt$TIPC_SRC_DROPPABLE(r13, 0x10f, 0x80, &(0x7f0000000040), 0x4) dup2(r0, r13) [ 2395.453235][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "1d040100"}, 0x28) 22:19:29 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) r5 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x67, 0x1d5000) readahead(r5, 0x5, 0x3) ioctl$SIOCNRDECOBS(r4, 0x89e2) 22:19:29 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:29 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000e0c009900000000000000000008000e0104000300000000"], 0x28}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r6 = socket(0x11, 0x3, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000001a80)) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001940)='NLBL_UNLBL\x00') mount(&(0x7f0000001b40)=@md0='/dev/md0\x00', &(0x7f0000001b80)='./bus\x00', &(0x7f0000001bc0)='ext4\x00', 0x40010, &(0x7f0000001c00)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(r6, &(0x7f0000001a40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001a00)={&(0x7f0000001980)=ANY=[@ANYBLOB="80000000", @ANYRES16=r7, @ANYBLOB="000329bd7000fddbdf250300000008000400e000000205000100000000001400060069703667720014000600766c616e300000000000000000000000050001000100000008000400e000000208000500e000000108000500ffffffff14000600766c616e3100"/112], 0x80}, 0x1, 0x0, 0x0, 0x820}, 0x4000000) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000580)={0x0, 0xfffffffffffffdfb, &(0x7f0000000540)={&(0x7f0000000000)=@getroute={0x14, 0x1a, 0x300, 0x70bd28, 0x25dfdbff, {}, ["", ""]}, 0x14}}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r9, 0x10f, 0x80, &(0x7f0000000040), 0x4) recvmsg(r9, &(0x7f0000001840)={&(0x7f0000001c40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000017c0)}, 0x2100) r11 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000001ac0)={{0xa, 0x4e20, 0x8, @empty, 0x5}, {0xa, 0x4e24, 0x20, @rand_addr="5d530a7d54f09164ee657a3b6eabe291", 0x8}, 0x40, [0x0, 0x9, 0x382, 0x0, 0x80000001, 0x1, 0x7, 0xe000]}, 0x5c) r12 = socket(0x11, 0x800000003, 0x0) bind(r12, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r12, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000340)={@broadcast, @multicast1, 0x0}, &(0x7f00000003c0)=0xc) sendmsg$nl_route(r11, &(0x7f0000000400)={0x0, 0x387, &(0x7f0000000200)={&(0x7f0000000000)=@ipv4_newroute={0x2c, 0x18, 0x331, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0x0, 0x3, 0xfe}, [@RTA_PREFSRC={0x0, 0x7, @broadcast}, @RTA_OIF={0x8, 0x4, r14}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000001900)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1401000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x2c, r3, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r13}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40c1}, 0x40070) [ 2395.669069][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x8, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2395.734201][ T28] audit: type=1804 audit(1578781169.242:556): pid=30729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2381/bus" dev="sda1" ino=16849 res=1 [ 2395.796600][T30729] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 22:19:29 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "1e040100"}, 0x28) 22:19:29 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={r7, 0x2, 0x6}, 0x8) dup2(r0, r1) 22:19:29 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:29 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x40042, 0x1) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2396.095649][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0xb, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:29 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) connect$vsock_stream(r4, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) r5 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) 22:19:29 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) [ 2396.320831][ T28] audit: type=1804 audit(1578781169.822:557): pid=31149 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2382/bus" dev="sda1" ino=16834 res=1 22:19:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20020100"}, 0x28) 22:19:30 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) [ 2396.546372][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x3b, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:30 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) r5 = socket(0x11, 0x3, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r7) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x228) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r8, 0xffffffffffffffff}}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) write$P9_RSTATu(r4, &(0x7f00000004c0)={0x9c, 0x7d, 0x2, {{0x0, 0x76, 0x0, 0x8, {0x4, 0x0, 0x5}, 0x10000, 0x27, 0x4, 0x401, 0x1d, 'systemvmnet0%eth0wlan1selinux', 0x4, '@em1', 0x11, '/dev/v4l-subdev#\x00', 0x11, '/dev/v4l-subdev#\x00'}, 0x11, '/dev/v4l-subdev#\x00', r7, r8, r10}}, 0x9c) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r11 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r11, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x1207) sendmsg$TIPC_NL_BEARER_ENABLE(r11, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="e0020000", @ANYRES16=0x0, @ANYBLOB="100026bd7000fddbdf25030000007c0004002c000700080000000000000008000200ff0700000800020001f0ffff080003000000000008000300050000000900010073797a30000000000c000700080003000400000009000073797a30000000001c0007000800030007000000080004004200000008000400040000000c000700080001001000040000000200080001000700000008000200400000000800020001000080200004000900018073797a3100000000040007000900010073797a30000000004c0005003400020008000400010000000800020063290000080001000200000008000400010000800800040000000000080001001a00000014000200080004006a7b00000800040000000000cc0001000d0001007564703a73797a3100000000140002000800040000000000080002001f0000002c0004001400010002004e21ac14143100000000000000001400020002004e2300009cda00000000000000002c0004001400010002004e20e000000200000000000000001400020002004e20e00000010000000000000000340002000800010020000000080004003fb6000008000400ffff00000800020008000000080001000800000008000300020000001500010069623a76657468315f746f5f626f6e64000000004800050008000100756470000700010069620000340002000800030002000000080001001b0000000800011509000000080003000001000008000400f8ffffff080001000e0000005800050007000100696200000c00020008000400ffff00001c0002000800030020000000080003000100000008000300e2000000080001007564700007000100696200001400020008000400d4640000080002000800000044000680088001008e07000008000100bb76000008000100ff00000008000100070000000800010000000000040002000800010009000000040002000400020004000200180007000c0004000200000000000000080002000400000000"], 0x2e0}, 0x1, 0x0, 0x0, 0x4000000}, 0x24040000) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000000080)={0xffffffff}, 0x4) 22:19:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20030100"}, 0x28) 22:19:30 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:30 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@remote={[], 0x0}, 0xb, 'veth0_to_hsr\x00'}) 22:19:30 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r4, 0xc0884113, &(0x7f0000000080)={0x0, 0x2, 0xff, 0x7, 0x9, 0x6, 0x3, 0x968, 0x1, 0x8, 0x81, 0x5}) dup2(r0, r1) 22:19:30 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20050100"}, 0x28) 22:19:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x300, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2397.022998][ T28] audit: type=1804 audit(1578781170.532:558): pid=31675 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2383/bus" dev="sda1" ino=17137 res=1 22:19:30 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x8001002, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000080)=0x1, 0x4) dup2(r0, r1) 22:19:30 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(0x0, 0x0, &(0x7f0000000340)="04", 0x1, r0) 22:19:30 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d1d, &(0x7f0000000000)=0x54) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) ftruncate(r1, 0x88004) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) r4 = shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000080)=""/11) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) fgetxattr(r5, &(0x7f0000000100)=@known='system.advise\x00', &(0x7f0000000200)=""/136, 0x88) 22:19:30 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(0x0, 0x0, &(0x7f0000000340)="04", 0x1, r0) 22:19:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20060100"}, 0x28) 22:19:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x500, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:31 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getpgrp(r1) r2 = syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x4, 0x452141) r3 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000080)=""/80, 0x50) getdents64(r7, &(0x7f0000000700)=""/66, 0x42) getdents64(r7, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r7, 0x54e3, 0x0) getdents64(r6, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000001c0)={r5, r6}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r8, &(0x7f0000000280)=""/94, 0xfc9e) getdents64(r8, &(0x7f0000000700)=""/39, 0x9) getdents64(r8, 0x0, 0x0) ioctl$PPPIOCSNPMODE(r8, 0x4008744b, &(0x7f0000000100)={0xc023}) dup2(r2, r3) r9 = socket$pppoe(0x18, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r9, 0xc080661a, &(0x7f0000000080)={{0x2, 0x0, @identifier="93ec92041b5d03eeaa64a8255e00441c"}}) [ 2397.551266][ T28] audit: type=1804 audit(1578781171.062:559): pid=31993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2384/bus" dev="sda1" ino=17161 res=1 22:19:31 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(0x0, 0x0, &(0x7f0000000340)="04", 0x1, r0) 22:19:31 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000000)) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20070100"}, 0x28) 22:19:31 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, 0x0, 0x0, r0) 22:19:31 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0xffffffffffff8000) r6 = dup2(r0, r1) setsockopt$IP_VS_SO_SET_DEL(r6, 0x0, 0x484, &(0x7f0000000080)={0x84, @local, 0x4e23, 0x2, 'dh\x00', 0x8, 0x7, 0x59}, 0xfffffffffffffe12) [ 2397.977067][ T28] audit: type=1804 audit(1578781171.482:560): pid=32311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2385/bus" dev="sda1" ino=16785 res=1 22:19:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x600, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:31 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, 0x0, 0x0, r0) 22:19:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20080100"}, 0x28) 22:19:31 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x8, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:31 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, 0x0, 0x0, r0) 22:19:31 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$TIOCSERGETLSR(r4, 0x5459, &(0x7f00000000c0)) r5 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r0, r1) [ 2398.381167][ C0] net_ratelimit: 4 callbacks suppressed [ 2398.381178][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:32 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:32 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340), 0x0, r0) 22:19:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x700, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:32 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x8001009, 0x980911, 0x3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r5, 0xc028ae92, &(0x7f0000000000)={0x6, 0xc78c}) [ 2398.656695][ T28] audit: type=1804 audit(1578781172.162:561): pid=32736 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2386/bus" dev="sda1" ino=16834 res=1 22:19:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "200a0100"}, 0x28) 22:19:32 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340), 0x0, r0) 22:19:32 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) write$FUSE_OPEN(r3, &(0x7f0000000100)={0x20, 0xfffffffffffffff5, 0x2, {0x0, 0x8}}, 0x20) getdents64(r4, 0x0, 0x0) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0xf0, 0x67, 0x3, 0x1, 0x0, 0xef1, 0x20000, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x2, 0x4}, 0x18200, 0x9, 0x50, 0x9, 0x80000000, 0x5, 0x2}, r4, 0x8, r3, 0x8) dup2(r5, r0) [ 2398.855572][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:32 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340), 0x0, r0) 22:19:32 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000000)={0x0, 0x4, 0x20, 0x0, 0x400, 0x30, 0x38, 0x2, 0x0, 0x20, 0xff, 0x6, 0x0, 0xff000000, 0x7, 0x2, 0x0, 0xfc, 0x5, [], 0x1f, 0x9}) 22:19:32 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r3) 22:19:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0xb00, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:32 executing program 0: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1, 0x0) 22:19:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20100100"}, 0x28) [ 2399.269478][ T28] audit: type=1804 audit(1578781172.772:562): pid=593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2387/bus" dev="sda1" ino=17161 res=1 22:19:32 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000140)=0xffff762f, 0x4) getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000100)={0xa20000, 0x2, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990a68, 0x8, [], @p_u8=&(0x7f0000000080)=0x82}}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r6, 0xc0106407, &(0x7f00000001c0)={0x897, 0x5, 0x6, 0x7}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup2(r0, r1) [ 2399.384921][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:32 executing program 0: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1, 0x0) 22:19:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040200"}, 0x28) 22:19:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x3b00, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:33 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x8, 0x1184a177bf2ece25) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000280)={0x7fffffff, 0x4}) ftruncate(r0, 0x88001) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x8, 0x1ff, 0x98, 0x6b6d2f85, 0x9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000140)={r5, 0x40}, &(0x7f0000000200)=0x8) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="99f1f6", 0x3}], 0x1) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r6, 0x0, 0x4e68d5f8) 22:19:33 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0xfffffffffffffffd, 0xa3baef0e8365ef14) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:33 executing program 0: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1, 0x0) [ 2399.702273][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2399.778174][ T28] audit: type=1804 audit(1578781173.282:563): pid=917 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2388/bus" dev="sda1" ino=17169 res=1 22:19:33 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) 22:19:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040400"}, 0x28) 22:19:33 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000000)) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000016c0)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x8000, 0xb3b}, &(0x7f00000001c0)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000001780)={r1, 0x80000001, 0x20}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@can, 0x80, &(0x7f0000001540)=[{&(0x7f0000000080)=""/32, 0x20}, {&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000280)=""/233, 0xe9}, {&(0x7f0000000380)=""/139, 0x8b}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f0000000440)=""/75, 0x4b}, {&(0x7f00000004c0)=""/111, 0x6f}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x8, &(0x7f00000015c0)=""/194, 0xc2}, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000017c0)={0x0, 0x0, r3}) ioctl$DRM_IOCTL_GEM_CLOSE(r2, 0x40086409, &(0x7f0000001800)={r4}) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0xfffffe7a, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$X25_QBITINCL(r5, 0x106, 0x1, &(0x7f0000001840), 0x4) 22:19:33 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0xd, 0x40) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x8000) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000080)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) r7 = dup2(r2, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) dup2(r0, r1) 22:19:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x3f00, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2400.066442][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:33 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) write$P9_RSTAT(r1, &(0x7f0000000100)={0x5a, 0x7d, 0x1, {0x0, 0x53, 0x0, 0xffffffff, {0xa0, 0x1, 0x8}, 0x2100000, 0xfff, 0x7ff, 0x4, 0x1f, ',vboxnet1:vboxnet1(ppp0vboxnet0', 0x0, '', 0x1, 'f'}}, 0x5a) ftruncate(r0, 0x88001) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) write$binfmt_aout(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x56b) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4e68d5f8) [ 2400.191286][ T28] audit: type=1804 audit(1578781173.702:564): pid=1227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4126/bus" dev="sda1" ino=17166 res=1 22:19:33 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) sendmmsg(r2, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x2a7}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0xc6fd) getpeername$l2tp6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)=0x20) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040a00"}, 0x28) 22:19:33 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup2(r0, r1) [ 2400.359879][ T28] audit: type=1804 audit(1578781173.862:565): pid=1491 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2389/bus" dev="sda1" ino=17297 res=1 [ 2400.426579][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x4000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:34 executing program 4: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) dup2(r1, r5) 22:19:34 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000000)) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x2) 22:19:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20046600"}, 0x28) 22:19:34 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendfile(r1, 0xffffffffffffffff, 0x0, 0x4e68d5f8) 22:19:34 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000000)) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2400.808113][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2400.827784][ T9565] serio: Serial port tty4 [ 2400.907425][ T28] audit: type=1804 audit(1578781174.412:566): pid=1957 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir357173108/syzkaller.O0QN9x/4127/bus" dev="sda1" ino=17169 res=1 22:19:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040003"}, 0x28) 22:19:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0xff00, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:34 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x40) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x5, 0x3, 0x29, 0x9, 0x3}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x80}, 0x8) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2401.077146][ T28] audit: type=1804 audit(1578781174.582:567): pid=2176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=17304 res=1 [ 2401.112138][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20070100"}, 0x28) 22:19:34 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) write$P9_RATTACH(r2, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x8c, 0x2, 0x4}}, 0x14) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:34 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000000)) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "200400ff"}, 0x28) 22:19:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x1000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2401.398756][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2401.477694][ T28] audit: type=1804 audit(1578781174.982:568): pid=2624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2391/bus" dev="sda1" ino=16620 res=1 22:19:35 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x9, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x62f84de21fd70f84, 0x0) bind$netlink(r3, &(0x7f0000000240)={0x10, 0x0, 0x25dfdbfe, 0x918cd35ecbde0ad9}, 0xc) r4 = socket(0x10, 0x80002, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2800) ioctl$DRM_IOCTL_INFO_BUFS(r5, 0xc0106418, &(0x7f00000002c0)={0x0, 0x495, 0x9, 0xa21a0, 0x10}) r6 = fcntl$dupfd(r4, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) openat(r7, &(0x7f0000000040)='./file0\x00', 0x80c60, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r7, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r8, 0x10f, 0x80, &(0x7f0000000040), 0x4) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r9, 0x84, 0x3, &(0x7f0000000140)=0x3f, 0x1) r10 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x10040, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r11, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r12, 0x10f, 0x80, &(0x7f0000000040), 0x4) r13 = dup2(r10, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) [ 2401.555798][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2401.663347][ T28] audit: type=1804 audit(1578781175.172:569): pid=2631 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=17313 res=1 22:19:35 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x9, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x62f84de21fd70f84, 0x0) bind$netlink(r3, &(0x7f0000000240)={0x10, 0x0, 0x25dfdbfe, 0x918cd35ecbde0ad9}, 0xc) r4 = socket(0x10, 0x80002, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2800) ioctl$DRM_IOCTL_INFO_BUFS(r5, 0xc0106418, &(0x7f00000002c0)={0x0, 0x495, 0x9, 0xa21a0, 0x10}) r6 = fcntl$dupfd(r4, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) openat(r7, &(0x7f0000000040)='./file0\x00', 0x80c60, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r7, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r8, 0x10f, 0x80, &(0x7f0000000040), 0x4) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r9, 0x84, 0x3, &(0x7f0000000140)=0x3f, 0x1) r10 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x10040, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r11, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r12, 0x10f, 0x80, &(0x7f0000000040), 0x4) r13 = dup2(r10, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) 22:19:35 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000000)) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:35 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20802, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20041fff"}, 0x28) 22:19:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x2000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2402.008951][ T28] audit: type=1804 audit(1578781175.512:570): pid=2970 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2392/bus" dev="sda1" ino=17168 res=1 22:19:35 executing program 0: syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x9, 0x0) r0 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000180)={0x3, 0x2000000980915}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x62f84de21fd70f84, 0x0) bind$netlink(r3, &(0x7f0000000240)={0x10, 0x0, 0x25dfdbfe, 0x918cd35ecbde0ad9}, 0xc) r4 = socket(0x10, 0x80002, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2800) ioctl$DRM_IOCTL_INFO_BUFS(r5, 0xc0106418, &(0x7f00000002c0)={0x0, 0x495, 0x9, 0xa21a0, 0x10}) r6 = fcntl$dupfd(r4, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) openat(r7, &(0x7f0000000040)='./file0\x00', 0x80c60, 0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r7, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r8, 0x10f, 0x80, &(0x7f0000000040), 0x4) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r9, 0x84, 0x3, &(0x7f0000000140)=0x3f, 0x1) r10 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x10040, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r11, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r12, 0x10f, 0x80, &(0x7f0000000040), 0x4) r13 = dup2(r10, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) 22:19:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000840)="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", 0x592, 0xfa9f8eb5ee87b6c9, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r3, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) write$binfmt_misc(r3, 0x0, 0x0) r4 = accept(r3, &(0x7f0000000500)=@ax25={{0x3, @netrom}, [@remote, @bcast, @remote, @rose, @default, @null, @netrom, @rose]}, 0x0) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000002c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVE(r4, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="800228bd7000fbdb6e3602000000080002000000000008000c00f0711f9608000400ffffffff"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NLBL_MGMT_C_LISTDEF(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1080480}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042cbd7000ffdbdf2506000000080000000000010000000c000300000014000600fe80000000000000000000000000002d140006"], 0x3}, 0x1, 0x0, 0x0, 0x814}, 0x10) sendmsg$NLBL_MGMT_C_LISTALL(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r5, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x4080) r6 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) restart_syscall() 22:19:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040102"}, 0x28) 22:19:35 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f0000000000)={0xf768996fbdc1f5cb, 0xce99, 0x8000, 0x145000, r0}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x426080, 0x0) ioctl$KDFONTOP_COPY(r4, 0x4b72, &(0x7f0000000140)={0x3, 0x1, 0x17, 0x1e, 0xd3, &(0x7f0000000200)}) 22:19:35 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x3000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:35 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f0000000000)='\x00', 0x1) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x303}, "fec89233f96868ab", "48132d075b0163a81f4b70ba2c5e866706082dfdd5a0831aa47afaedab4ac79b", "4066e997", "1549250a9a8ae61e"}, 0x38) open(&(0x7f0000000080)='./bus\x00', 0x222000, 0x52) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:35 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback, 0x5}, 0x1c) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040103"}, 0x28) 22:19:36 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000000)="d1e497f7c84eabd7f36c5f7ae3031645b55245b0ce412700d5953f3590f12f5bc84e3aecdd35ec4e83dc7072701cb877e820f7f61cfad2c884ca60e2431ef11306e743a2b0804971d8cd067a6e7c728df05f164f020d44a51550db1aab710e50b8ba26ceced247af4798cb59195835bb48bf11798fd779b7caf29a790ffe2cffa6eb652dee09581dd9", 0x89, r3}, 0x68) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x58080280}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r4, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x7f}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4040000) 22:19:36 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x40b, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r4, 0xcf8}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={r6, 0xdf}, &(0x7f0000000080)=0x8) r7 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r7, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000bc0)=@ipv6_deladdr={0x17, 0x15, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IFA_FLAGS={0x8}]}, 0x34}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x4000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040104"}, 0x28) 22:19:36 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x8000100000000) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f00000002c0)=0x80) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r6 = request_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000200)='\x00', 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000240)={r6, 0xcc, 0xc3}, 0x0, &(0x7f0000000380)="0607af7809cea85cd139cabe6a409bc9f31f4bd5e7dacd1cc016e6cd032ff9882fd272f06e20e00d517e883b2f24ff833140727c7d179825512492b109daf4ca87797cd389b34cc799b3e92842668333b5873c8082e32a58ba366c214d53cf2247b747aae2ebc4ed45d644892b2e0f1485b6db2eb280a718b324a7b7d66f0fcb130736207ba8ec97f06f413a0af7ec3117081e4f1124aa588735fced178f55383e580d5c5baa307daa82f3fa449e70038bd8f9a46de4177d82f4a5f210fcd0181a49cc88b28ffe4ebd3b132b", &(0x7f0000000480)=""/195) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x20) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={r5, 0x400, 0x0, 0x1}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r7, 0x7}, 0x8) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000280)='/dev/udmabuf\x00', 0x2) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x4e68d5f8) 22:19:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) sendmmsg(r1, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0xffffff91, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$isdn(0x22, 0x3, 0x12) recvmsg(r2, &(0x7f0000000440)={&(0x7f0000000000)=@can, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/219, 0xdb}, {&(0x7f0000000280)=""/161, 0xa1}], 0x2, &(0x7f0000000340)=""/216, 0xd8}, 0x61) 22:19:36 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) 22:19:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x5000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:36 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x80) sync_file_range(r0, 0x3, 0x403, 0x4) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$VIDIOC_CROPCAP(r3, 0xc02c563a, &(0x7f0000000000)={0xa, {0x9, 0xffff361f, 0x3, 0x8000}, {0x3, 0xce, 0x0, 0x9}, {0x767, 0x9}}) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x4e68d5f8) 22:19:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040105"}, 0x28) 22:19:36 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@ipv4_newroute={0x2c, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_PREFSRC={0x8, 0x7, @broadcast}, @RTA_OIF={0x8, 0x4, r4}]}, 0x2c}}, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x24460801}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=@ipmr_getroute={0x1c, 0x1a, 0x800, 0x70bd2a, 0x25dfdbfe, {0x80, 0xa0, 0x0, 0x80, 0xfd, 0x2, 0x0, 0xb, 0x100}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x24000000) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@local, r4}, 0x14) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2403.499634][ C0] net_ratelimit: 4 callbacks suppressed [ 2403.499645][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:37 executing program 4 (fault-call:1 fault-nth:0): r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040106"}, 0x28) 22:19:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x6000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2403.824718][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:37 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000200)="fd033e56171024ab7372fe2220348d053d201ef22488e48565c17f753a83bfeb6a1263682ed279adbf9c54d39074b04d070b1105e43ac867ab8a0ac3fbeefa9496676ea037d2e2c1d771364bcddb7145c3577a5bcbfc9b5a059a89bc265399d3f01ee4c6661d8ab26c66e6c0450baf86a253064fce7104da3d59c6f98f63f609df4e8bd5acecd8f11ded27bd31c9193d074230ddadf1947aad68ad301995d70fb6eaeab92b8680eb7012ee7335a43b04778d22ad4c12b365d280b37b20d0ed4e7881f3ed4991371d7c26", 0xca, r2) keyctl$read(0xb, r3, &(0x7f0000000300)=""/131, 0x83) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000080)={r7, 0x6, 0x10}, 0xc) r8 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r8, 0x0, 0x4e68d5f8) 22:19:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}, 0x1}, 0x1b) sendmmsg(r0, &(0x7f000000dc40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)="00fafc0fb87f8327d143467b79cf9ad826bddbbb", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:19:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:37 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040107"}, 0x28) 22:19:37 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="03", 0x2, r0) [ 2404.137584][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 2404.137604][ T28] audit: type=1804 audit(1578781177.642:577): pid=4983 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2396/bus" dev="sda1" ino=16630 res=1 22:19:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x7000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2404.250844][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:37 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x3, r0) 22:19:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040108"}, 0x28) 22:19:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:37 executing program 5 (fault-call:5 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:19:38 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) r2 = socket(0x11, 0x3, 0x0) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 2404.554244][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:38 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x4, r0) 22:19:38 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x8000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2404.658926][ T5475] FAULT_INJECTION: forcing a failure. [ 2404.658926][ T5475] name failslab, interval 1, probability 0, space 0, times 0 [ 2404.794746][ T5475] CPU: 0 PID: 5475 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2404.803397][ T5475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2404.813572][ T5475] Call Trace: [ 2404.816885][ T5475] dump_stack+0x197/0x210 [ 2404.821256][ T5475] should_fail.cold+0xa/0x15 [ 2404.825870][ T5475] ? fault_create_debugfs_attr+0x180/0x180 [ 2404.831695][ T5475] ? ___might_sleep+0x163/0x2c0 [ 2404.836643][ T5475] __should_failslab+0x121/0x190 [ 2404.841613][ T5475] should_failslab+0x9/0x14 [ 2404.846115][ T5475] kmem_cache_alloc_node_trace+0x274/0x750 [ 2404.851932][ T5475] ? __might_fault+0x12b/0x1e0 [ 2404.856706][ T5475] __kmalloc_node+0x3d/0x70 [ 2404.861204][ T5475] kvmalloc_node+0x68/0x100 [ 2404.865705][ T5475] traverse+0x3e9/0x730 [ 2404.869887][ T5475] seq_read+0x906/0x1170 [ 2404.874137][ T5475] ? rw_verify_area+0x126/0x360 [ 2404.878981][ T5475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2404.885479][ T5475] do_iter_read+0x4a4/0x660 [ 2404.889980][ T5475] ? dup_iter+0x260/0x260 [ 2404.894323][ T5475] vfs_readv+0xf0/0x160 [ 2404.898478][ T5475] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2404.904540][ T5475] ? __kasan_check_read+0x11/0x20 [ 2404.909573][ T5475] ? ksys_dup3+0x3e0/0x3e0 [ 2404.913990][ T5475] ? wait_for_completion+0x440/0x440 [ 2404.919281][ T5475] ? __fget_light+0x1a9/0x230 [ 2404.923954][ T5475] do_preadv+0x1c4/0x280 [ 2404.928192][ T5475] ? do_readv+0x330/0x330 [ 2404.932515][ T5475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2404.937967][ T5475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2404.943418][ T5475] ? do_syscall_64+0x26/0x790 [ 2404.948091][ T5475] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2404.954162][ T5475] ? do_syscall_64+0x26/0x790 [ 2404.958839][ T5475] __x64_sys_preadv+0x9a/0xf0 [ 2404.963513][ T5475] do_syscall_64+0xfa/0x790 [ 2404.968200][ T5475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2404.974092][ T5475] RIP: 0033:0x45af49 [ 2404.977988][ T5475] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2404.997722][ T5475] RSP: 002b:00007f0777d7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2405.006148][ T5475] RAX: ffffffffffffffda RBX: 00007f0777d7bc90 RCX: 000000000045af49 [ 2405.014280][ T5475] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000006 [ 2405.022267][ T5475] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2405.030372][ T5475] R10: 0000000000000700 R11: 0000000000000246 R12: 00007f0777d7c6d4 22:19:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "2004010c"}, 0x28) [ 2405.038367][ T5475] R13: 00000000004c952c R14: 00000000004e1f70 R15: 0000000000000007 22:19:38 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:38 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x5, r0) [ 2405.101037][ T28] audit: type=1804 audit(1578781178.612:578): pid=5578 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2397/bus" dev="sda1" ino=17331 res=1 [ 2405.186430][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:38 executing program 5 (fault-call:5 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:19:38 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:38 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x8, r0) 22:19:38 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x2c, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2405.463150][ T5893] FAULT_INJECTION: forcing a failure. [ 2405.463150][ T5893] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2405.476412][ T5893] CPU: 1 PID: 5893 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2405.485126][ T5893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2405.495204][ T5893] Call Trace: [ 2405.498520][ T5893] dump_stack+0x197/0x210 [ 2405.502888][ T5893] should_fail.cold+0xa/0x15 [ 2405.507485][ T5893] ? fault_create_debugfs_attr+0x180/0x180 [ 2405.513299][ T5893] ? __lockdep_free_key_range+0x120/0x120 [ 2405.519023][ T5893] should_fail_alloc_page+0x50/0x60 [ 2405.524219][ T5893] __alloc_pages_nodemask+0x1a1/0x910 [ 2405.529588][ T5893] ? find_held_lock+0x35/0x130 [ 2405.534350][ T5893] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2405.540088][ T5893] ? __kasan_check_read+0x11/0x20 [ 2405.545120][ T5893] cache_grow_begin+0x90/0xc60 [ 2405.549884][ T5893] ? trace_hardirqs_off+0x62/0x240 [ 2405.555007][ T5893] kmem_cache_alloc_node_trace+0x689/0x750 [ 2405.560819][ T5893] ? __might_fault+0x12b/0x1e0 [ 2405.565583][ T5893] __kmalloc_node+0x3d/0x70 [ 2405.570080][ T5893] kvmalloc_node+0x68/0x100 [ 2405.574592][ T5893] traverse+0x3e9/0x730 [ 2405.578747][ T5893] seq_read+0x906/0x1170 [ 2405.582993][ T5893] ? rw_verify_area+0x126/0x360 [ 2405.587854][ T5893] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2405.594086][ T5893] do_iter_read+0x4a4/0x660 [ 2405.598603][ T5893] ? dup_iter+0x260/0x260 [ 2405.602947][ T5893] vfs_readv+0xf0/0x160 [ 2405.607124][ T5893] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2405.613210][ T5893] ? __kasan_check_read+0x11/0x20 [ 2405.618251][ T5893] ? ksys_dup3+0x3e0/0x3e0 [ 2405.622793][ T5893] ? wait_for_completion+0x440/0x440 [ 2405.628087][ T5893] ? __fget_light+0x1a9/0x230 [ 2405.632790][ T5893] do_preadv+0x1c4/0x280 [ 2405.637054][ T5893] ? do_readv+0x330/0x330 [ 2405.641903][ T5893] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2405.647362][ T5893] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2405.652817][ T5893] ? do_syscall_64+0x26/0x790 [ 2405.657487][ T5893] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2405.663545][ T5893] ? do_syscall_64+0x26/0x790 [ 2405.668221][ T5893] __x64_sys_preadv+0x9a/0xf0 [ 2405.672894][ T5893] do_syscall_64+0xfa/0x790 [ 2405.677394][ T5893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2405.683274][ T5893] RIP: 0033:0x45af49 [ 2405.687165][ T5893] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:19:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040110"}, 0x28) 22:19:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) [ 2405.706874][ T5893] RSP: 002b:00007f0777d7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2405.715457][ T5893] RAX: ffffffffffffffda RBX: 00007f0777d7bc90 RCX: 000000000045af49 [ 2405.723559][ T5893] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000006 [ 2405.731663][ T5893] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2405.739641][ T5893] R10: 0000000000000700 R11: 0000000000000246 R12: 00007f0777d7c6d4 [ 2405.747618][ T5893] R13: 00000000004c952c R14: 00000000004e1f70 R15: 0000000000000007 22:19:39 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0xb, r0) 22:19:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0xb000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:39 executing program 5 (fault-call:5 fault-nth:2): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2405.880051][ T28] audit: type=1804 audit(1578781179.382:579): pid=5898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2398/bus" dev="sda1" ino=16894 res=1 [ 2405.942391][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:39 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x11, r0) 22:19:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2406.100872][ T6023] FAULT_INJECTION: forcing a failure. [ 2406.100872][ T6023] name failslab, interval 1, probability 0, space 0, times 0 [ 2406.159833][ T6023] CPU: 0 PID: 6023 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2406.168486][ T6023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2406.178596][ T6023] Call Trace: [ 2406.181910][ T6023] dump_stack+0x197/0x210 [ 2406.186270][ T6023] should_fail.cold+0xa/0x15 [ 2406.190888][ T6023] ? fault_create_debugfs_attr+0x180/0x180 [ 2406.196719][ T6023] ? ___might_sleep+0x163/0x2c0 [ 2406.201601][ T6023] __should_failslab+0x121/0x190 [ 2406.206566][ T6023] should_failslab+0x9/0x14 [ 2406.211090][ T6023] kmem_cache_alloc_trace+0x2d3/0x790 [ 2406.216481][ T6023] ? seq_printf+0xbb/0xf0 [ 2406.220910][ T6023] cgroup_show_path+0xc6/0x5d0 [ 2406.225703][ T6023] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 2406.231433][ T6023] kernfs_sop_show_path+0x130/0x1b0 [ 2406.236656][ T6023] ? kernfs_test_super+0x150/0x150 [ 2406.241857][ T6023] show_mountinfo+0x246/0x940 [ 2406.246567][ T6023] ? down_read_killable+0x490/0x490 [ 2406.251791][ T6023] ? show_vfsmnt+0x420/0x420 [ 2406.256415][ T6023] ? seq_list_start+0x9d/0xc0 [ 2406.260762][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2406.261112][ T6023] m_show+0x61/0x80 [ 2406.276349][ T6023] traverse+0x1cd/0x730 [ 2406.280535][ T6023] seq_read+0x906/0x1170 [ 2406.284808][ T6023] ? rw_verify_area+0x126/0x360 [ 2406.289675][ T6023] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2406.295916][ T6023] do_iter_read+0x4a4/0x660 [ 2406.300412][ T6023] ? dup_iter+0x260/0x260 [ 2406.304752][ T6023] vfs_readv+0xf0/0x160 [ 2406.308903][ T6023] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2406.314962][ T6023] ? __kasan_check_read+0x11/0x20 [ 2406.319992][ T6023] ? ksys_dup3+0x3e0/0x3e0 [ 2406.324406][ T6023] ? wait_for_completion+0x440/0x440 [ 2406.329689][ T6023] ? __fget_light+0x1a9/0x230 [ 2406.334380][ T6023] do_preadv+0x1c4/0x280 [ 2406.338631][ T6023] ? do_readv+0x330/0x330 [ 2406.343041][ T6023] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2406.348504][ T6023] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2406.353953][ T6023] ? do_syscall_64+0x26/0x790 [ 2406.358633][ T6023] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.364692][ T6023] ? do_syscall_64+0x26/0x790 [ 2406.369366][ T6023] __x64_sys_preadv+0x9a/0xf0 [ 2406.374051][ T6023] do_syscall_64+0xfa/0x790 [ 2406.378567][ T6023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.384467][ T6023] RIP: 0033:0x45af49 [ 2406.388368][ T6023] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:19:39 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@hci={0x1f, 0x6, 0x3}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f0000000000)=0x8) [ 2406.407995][ T6023] RSP: 002b:00007f0777d7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2406.416404][ T6023] RAX: ffffffffffffffda RBX: 00007f0777d7bc90 RCX: 000000000045af49 [ 2406.424541][ T6023] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000006 [ 2406.432503][ T6023] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2406.440483][ T6023] R10: 0000000000000700 R11: 0000000000000246 R12: 00007f0777d7c6d4 [ 2406.448748][ T6023] R13: 00000000004c952c R14: 00000000004e1f70 R15: 0000000000000007 22:19:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:40 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x13, r0) 22:19:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2406.581411][ T28] audit: type=1804 audit(1578781180.092:580): pid=6295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2399/bus" dev="sda1" ino=17335 res=1 22:19:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x3b000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) [ 2406.699348][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:40 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x15, r0) 22:19:40 executing program 5 (fault-call:5 fault-nth:3): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:19:40 executing program 2: ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000100)={0xfffffff, 0xffff, 0xfffffffd, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990a74, 0x2dd5, [], @value=0x3}}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000006}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x118, r1, 0xf20, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xe1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf248}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0xbc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x100, @rand_addr="72fcc5ab5a006947f1dc609f5a2d2423"}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x76, @empty, 0xa5b4}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x3ff, @mcast1, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x40000040}, 0x60000c1e) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x88001) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80200, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x404a00) sendfile(r4, r5, 0x0, 0x4e68d5f8) ioctl$SOUND_MIXER_WRITE_VOLUME(r2, 0xc0044d1a, &(0x7f0000000040)=0x3e) 22:19:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) [ 2406.953802][ T6569] FAULT_INJECTION: forcing a failure. [ 2406.953802][ T6569] name fail_page_alloc, interval 1, probability 0, space 0, times 0 22:19:40 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x18, r0) [ 2407.050002][ T6569] CPU: 0 PID: 6569 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2407.058659][ T6569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2407.059872][ T28] audit: type=1804 audit(1578781180.552:581): pid=6614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2400/bus" dev="sda1" ino=17190 res=1 [ 2407.068726][ T6569] Call Trace: [ 2407.068781][ T6569] dump_stack+0x197/0x210 [ 2407.068805][ T6569] should_fail.cold+0xa/0x15 [ 2407.105688][ T6569] ? fault_create_debugfs_attr+0x180/0x180 [ 2407.111518][ T6569] ? ___might_sleep+0x163/0x2c0 [ 2407.116403][ T6569] should_fail_alloc_page+0x50/0x60 [ 2407.121630][ T6569] __alloc_pages_nodemask+0x1a1/0x910 [ 2407.127032][ T6569] ? mark_lock+0xc2/0x1220 [ 2407.131455][ T6569] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2407.137180][ T6569] ? cache_grow_begin+0x36d/0xc60 [ 2407.142198][ T6569] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2407.147492][ T6569] ? trace_hardirqs_on+0x67/0x240 [ 2407.152514][ T6569] cache_grow_begin+0x90/0xc60 [ 2407.157290][ T6569] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2407.163698][ T6569] ? mempolicy_slab_node+0x139/0x390 [ 2407.169002][ T6569] fallback_alloc+0x1f8/0x2d0 [ 2407.173691][ T6569] ____cache_alloc_node+0x1bc/0x1d0 [ 2407.178908][ T6569] ? trace_hardirqs_off+0x62/0x240 [ 2407.184047][ T6569] kmem_cache_alloc_node_trace+0xec/0x750 [ 2407.189772][ T6569] ? __might_fault+0x12b/0x1e0 [ 2407.194562][ T6569] __kmalloc_node+0x3d/0x70 [ 2407.199067][ T6569] kvmalloc_node+0x68/0x100 [ 2407.203565][ T6569] traverse+0x3e9/0x730 [ 2407.207723][ T6569] seq_read+0x906/0x1170 [ 2407.211972][ T6569] ? rw_verify_area+0x126/0x360 [ 2407.216822][ T6569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2407.223059][ T6569] do_iter_read+0x4a4/0x660 [ 2407.227657][ T6569] ? dup_iter+0x260/0x260 [ 2407.231996][ T6569] vfs_readv+0xf0/0x160 [ 2407.236169][ T6569] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2407.242254][ T6569] ? __kasan_check_read+0x11/0x20 [ 2407.247307][ T6569] ? ksys_dup3+0x3e0/0x3e0 [ 2407.252087][ T6569] ? wait_for_completion+0x440/0x440 [ 2407.257370][ T6569] ? __fget_light+0x1a9/0x230 [ 2407.262046][ T6569] do_preadv+0x1c4/0x280 [ 2407.266298][ T6569] ? do_readv+0x330/0x330 [ 2407.270620][ T6569] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2407.276073][ T6569] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2407.281540][ T6569] ? do_syscall_64+0x26/0x790 [ 2407.286213][ T6569] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2407.292285][ T6569] ? do_syscall_64+0x26/0x790 [ 2407.296960][ T6569] __x64_sys_preadv+0x9a/0xf0 [ 2407.301632][ T6569] do_syscall_64+0xfa/0x790 [ 2407.306134][ T6569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2407.312033][ T6569] RIP: 0033:0x45af49 [ 2407.315918][ T6569] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2407.335528][ T6569] RSP: 002b:00007f0777d7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2407.343934][ T6569] RAX: ffffffffffffffda RBX: 00007f0777d7bc90 RCX: 000000000045af49 [ 2407.351897][ T6569] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000006 [ 2407.359858][ T6569] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2407.367827][ T6569] R10: 0000000000000700 R11: 0000000000000246 R12: 00007f0777d7c6d4 [ 2407.375792][ T6569] R13: 00000000004c952c R14: 00000000004e1f70 R15: 0000000000000007 [ 2407.390133][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x3f000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:41 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1a, r0) 22:19:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:41 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) bind(r2, &(0x7f0000000180)=@generic={0xf9a0924ffd671c0f, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x4e68d5f8) 22:19:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:41 executing program 5 (fault-call:5 fault-nth:4): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2407.733777][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:41 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1b, r0) [ 2407.798426][ T28] audit: type=1804 audit(1578781181.302:582): pid=6947 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2401/bus" dev="sda1" ino=17340 res=1 22:19:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x40000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:41 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1c, r0) [ 2408.013185][ T7119] FAULT_INJECTION: forcing a failure. [ 2408.013185][ T7119] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.081945][ T7119] CPU: 0 PID: 7119 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2408.090595][ T7119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2408.100667][ T7119] Call Trace: [ 2408.103982][ T7119] dump_stack+0x197/0x210 [ 2408.108343][ T7119] should_fail.cold+0xa/0x15 [ 2408.113006][ T7119] ? fault_create_debugfs_attr+0x180/0x180 [ 2408.118845][ T7119] ? ___might_sleep+0x163/0x2c0 [ 2408.123727][ T7119] __should_failslab+0x121/0x190 [ 2408.128693][ T7119] should_failslab+0x9/0x14 [ 2408.133263][ T7119] kmem_cache_alloc_trace+0x2d3/0x790 [ 2408.138777][ T7119] ? seq_printf+0xbb/0xf0 [ 2408.144102][ T7119] cgroup_show_path+0xc6/0x5d0 [ 2408.148911][ T7119] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 2408.154576][ T7119] kernfs_sop_show_path+0x130/0x1b0 [ 2408.159957][ T7119] ? kernfs_test_super+0x150/0x150 [ 2408.165181][ T7119] show_mountinfo+0x246/0x940 [ 2408.169987][ T7119] ? down_read_killable+0x490/0x490 [ 2408.175219][ T7119] ? show_vfsmnt+0x420/0x420 [ 2408.179876][ T7119] ? seq_list_start+0x9d/0xc0 [ 2408.184596][ T7119] m_show+0x61/0x80 [ 2408.188485][ T7119] traverse+0x1cd/0x730 [ 2408.192857][ T7119] seq_read+0x906/0x1170 [ 2408.197275][ T7119] ? rw_verify_area+0x126/0x360 [ 2408.202153][ T7119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2408.208434][ T7119] do_iter_read+0x4a4/0x660 [ 2408.212944][ T7119] ? dup_iter+0x260/0x260 [ 2408.217317][ T7119] vfs_readv+0xf0/0x160 [ 2408.221485][ T7119] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2408.227576][ T7119] ? __kasan_check_read+0x11/0x20 [ 2408.232635][ T7119] ? ksys_dup3+0x3e0/0x3e0 [ 2408.237057][ T7119] ? wait_for_completion+0x440/0x440 [ 2408.242366][ T7119] ? __fget_light+0x1a9/0x230 [ 2408.247086][ T7119] do_preadv+0x1c4/0x280 [ 2408.251474][ T7119] ? do_readv+0x330/0x330 [ 2408.255833][ T7119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.261305][ T7119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.267025][ T7119] ? do_syscall_64+0x26/0x790 [ 2408.271698][ T7119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.277759][ T7119] ? do_syscall_64+0x26/0x790 [ 2408.282442][ T7119] __x64_sys_preadv+0x9a/0xf0 [ 2408.287116][ T7119] do_syscall_64+0xfa/0x790 [ 2408.291627][ T7119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.297509][ T7119] RIP: 0033:0x45af49 [ 2408.301405][ T7119] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2408.321000][ T7119] RSP: 002b:00007f0777d7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 22:19:41 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x1b, 0x74cb86c8f77a6590, 0x3f) write(r1, &(0x7f0000000100)="cdce694f3cd33f7210ee1aba71077f6499d04f2646aa07f154998b9e8a55325240c82f7ca8fd1785ae252cf900f00cf35331f26ebb214762496800904e579b2dcb8db36fcedacd3d9f09530d66dd1ec4731f42add2770ed33cd857a57ffe5d83356ea620048aa1b4e8e267f80600ca4f9596935df8635a7d3420e51d4c1a3bf92c43601a8a64f8ebfb5fb1cfee265aa9391b57734b7c4f2a3a6d12be0c4dfccd25d3dd8d4d9872e81e32a5f8d9788738899cd3fd02623b29c0c5332c32bf73290a148308bb611e0cc9666d9777fd7b48ade0b34211b59944cc8f209b23b1644cc4d284b14b3ba158f42e1c3f88a27f2344ae95404ec4dcd05616cdd76b3cef", 0xff) bind(r1, &(0x7f0000000000)=@generic={0x1a, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0xffffffffffffff0c) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080)) 22:19:41 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1d, r0) [ 2408.329400][ T7119] RAX: ffffffffffffffda RBX: 00007f0777d7bc90 RCX: 000000000045af49 [ 2408.337377][ T7119] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000006 [ 2408.345341][ T7119] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2408.353304][ T7119] R10: 0000000000000700 R11: 0000000000000246 R12: 00007f0777d7c6d4 [ 2408.361642][ T7119] R13: 00000000004c952c R14: 00000000004e1f70 R15: 0000000000000007 22:19:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:42 executing program 5 (fault-call:5 fault-nth:5): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:19:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0xfdfdffff, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2408.495508][ T28] audit: type=1804 audit(1578781182.002:583): pid=7386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2402/bus" dev="sda1" ino=17338 res=1 22:19:42 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1e, r0) [ 2408.634411][ C1] net_ratelimit: 1 callbacks suppressed [ 2408.634421][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) [ 2408.690386][ T7399] FAULT_INJECTION: forcing a failure. [ 2408.690386][ T7399] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.718166][ T7399] CPU: 1 PID: 7399 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2408.726998][ T7399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2408.737292][ T7399] Call Trace: 22:19:42 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)=0x8) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2408.740712][ T7399] dump_stack+0x197/0x210 [ 2408.745075][ T7399] should_fail.cold+0xa/0x15 [ 2408.749845][ T7399] ? fault_create_debugfs_attr+0x180/0x180 [ 2408.755693][ T7399] ? ___might_sleep+0x163/0x2c0 [ 2408.761536][ T7399] __should_failslab+0x121/0x190 [ 2408.766585][ T7399] should_failslab+0x9/0x14 [ 2408.771404][ T7399] kmem_cache_alloc_trace+0x2d3/0x790 [ 2408.776772][ T7399] ? seq_printf+0xbb/0xf0 [ 2408.781119][ T7399] cgroup_show_path+0xc6/0x5d0 [ 2408.785883][ T7399] ? cgroup1_show_options+0x2ae/0x490 [ 2408.791364][ T7399] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 2408.797123][ T7399] kernfs_sop_show_path+0x130/0x1b0 [ 2408.802365][ T7399] ? kernfs_test_super+0x150/0x150 [ 2408.807493][ T7399] show_mountinfo+0x246/0x940 [ 2408.812163][ T7399] ? down_read_killable+0x490/0x490 [ 2408.817472][ T7399] ? show_vfsmnt+0x420/0x420 [ 2408.822068][ T7399] ? seq_list_start+0x9d/0xc0 [ 2408.826814][ T7399] m_show+0x61/0x80 [ 2408.830617][ T7399] traverse+0x1cd/0x730 [ 2408.834867][ T7399] seq_read+0x906/0x1170 [ 2408.839169][ T7399] ? rw_verify_area+0x126/0x360 [ 2408.844031][ T7399] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2408.850281][ T7399] do_iter_read+0x4a4/0x660 [ 2408.854792][ T7399] ? dup_iter+0x260/0x260 [ 2408.859252][ T7399] vfs_readv+0xf0/0x160 [ 2408.863413][ T7399] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2408.869624][ T7399] ? __kasan_check_read+0x11/0x20 [ 2408.874647][ T7399] ? ksys_dup3+0x3e0/0x3e0 [ 2408.879063][ T7399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2408.885300][ T7399] ? debug_smp_processor_id+0x33/0x18a [ 2408.890773][ T7399] ? __fget_light+0x1a9/0x230 [ 2408.895460][ T7399] do_preadv+0x1c4/0x280 [ 2408.899795][ T7399] ? do_readv+0x330/0x330 [ 2408.904247][ T7399] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.909733][ T7399] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.916507][ T7399] ? do_syscall_64+0x26/0x790 [ 2408.921200][ T7399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.927272][ T7399] ? do_syscall_64+0x26/0x790 [ 2408.931954][ T7399] __x64_sys_preadv+0x9a/0xf0 [ 2408.936712][ T7399] do_syscall_64+0xfa/0x790 [ 2408.941209][ T7399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.947096][ T7399] RIP: 0033:0x45af49 [ 2408.950993][ T7399] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2408.970831][ T7399] RSP: 002b:00007f0777d7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2408.979301][ T7399] RAX: ffffffffffffffda RBX: 00007f0777d7bc90 RCX: 000000000045af49 [ 2408.987275][ T7399] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000006 [ 2408.995357][ T7399] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2409.003320][ T7399] R10: 0000000000000700 R11: 0000000000000246 R12: 00007f0777d7c6d4 [ 2409.011358][ T7399] R13: 00000000004c952c R14: 00000000004e1f70 R15: 0000000000000007 22:19:42 executing program 5 (fault-call:5 fault-nth:6): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:19:42 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x21, r0) 22:19:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2409.278808][ T7680] FAULT_INJECTION: forcing a failure. [ 2409.278808][ T7680] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2409.292058][ T7680] CPU: 1 PID: 7680 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2409.300636][ T7680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2409.310684][ T7680] Call Trace: [ 2409.314035][ T7680] dump_stack+0x197/0x210 [ 2409.318417][ T7680] should_fail.cold+0xa/0x15 [ 2409.323043][ T7680] ? fault_create_debugfs_attr+0x180/0x180 [ 2409.328982][ T7680] ? debug_smp_processor_id+0x33/0x18a [ 2409.334450][ T7680] ? perf_trace_lock+0xeb/0x4c0 [ 2409.339294][ T7680] ? __lock_acquire+0x16f2/0x4a00 [ 2409.344321][ T7680] should_fail_alloc_page+0x50/0x60 [ 2409.349512][ T7680] __alloc_pages_nodemask+0x1a1/0x910 [ 2409.354878][ T7680] ? fs_reclaim_release+0xf/0x30 [ 2409.359812][ T7680] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2409.365522][ T7680] ? fs_reclaim_release+0xf/0x30 [ 2409.370466][ T7680] ? fault_create_debugfs_attr+0x180/0x180 [ 2409.376281][ T7680] cache_grow_begin+0x90/0xc60 [ 2409.381039][ T7680] ? trace_hardirqs_off+0x62/0x240 [ 2409.386145][ T7680] kmem_cache_alloc_trace+0x6b3/0x790 [ 2409.391528][ T7680] cgroup_show_path+0xc6/0x5d0 [ 2409.396285][ T7680] ? cgroup1_show_options+0x2ae/0x490 [ 2409.401663][ T7680] ? cgroup_migrate_add_task+0x8b0/0x8b0 [ 2409.407290][ T7680] kernfs_sop_show_path+0x130/0x1b0 [ 2409.412493][ T7680] ? kernfs_test_super+0x150/0x150 [ 2409.417598][ T7680] show_mountinfo+0x246/0x940 [ 2409.422268][ T7680] ? down_read_killable+0x490/0x490 [ 2409.427475][ T7680] ? show_vfsmnt+0x420/0x420 [ 2409.432058][ T7680] ? seq_list_start+0x9d/0xc0 [ 2409.436746][ T7680] m_show+0x61/0x80 [ 2409.440550][ T7680] traverse+0x1cd/0x730 [ 2409.444734][ T7680] seq_read+0x906/0x1170 [ 2409.448985][ T7680] ? rw_verify_area+0x126/0x360 [ 2409.453830][ T7680] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2409.460064][ T7680] do_iter_read+0x4a4/0x660 [ 2409.464560][ T7680] ? dup_iter+0x260/0x260 [ 2409.469041][ T7680] vfs_readv+0xf0/0x160 [ 2409.473321][ T7680] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2409.479422][ T7680] ? __kasan_check_read+0x11/0x20 [ 2409.484494][ T7680] ? ksys_dup3+0x3e0/0x3e0 [ 2409.488918][ T7680] ? wait_for_completion+0x440/0x440 [ 2409.494246][ T7680] ? __fget_light+0x1a9/0x230 [ 2409.498954][ T7680] do_preadv+0x1c4/0x280 [ 2409.503222][ T7680] ? do_readv+0x330/0x330 [ 2409.507583][ T7680] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2409.513041][ T7680] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2409.518498][ T7680] ? do_syscall_64+0x26/0x790 [ 2409.523169][ T7680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.529225][ T7680] ? do_syscall_64+0x26/0x790 [ 2409.533905][ T7680] __x64_sys_preadv+0x9a/0xf0 [ 2409.538578][ T7680] do_syscall_64+0xfa/0x790 [ 2409.543081][ T7680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.548978][ T7680] RIP: 0033:0x45af49 [ 2409.552865][ T7680] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2409.572466][ T7680] RSP: 002b:00007f0777d7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2409.580879][ T7680] RAX: ffffffffffffffda RBX: 00007f0777d7bc90 RCX: 000000000045af49 [ 2409.588876][ T7680] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000006 [ 2409.596865][ T7680] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2409.604838][ T7680] R10: 0000000000000700 R11: 0000000000000246 R12: 00007f0777d7c6d4 [ 2409.612813][ T7680] R13: 00000000004c952c R14: 00000000004e1f70 R15: 0000000000000007 [ 2409.623239][ T28] audit: type=1804 audit(1578781182.772:584): pid=7665 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2403/bus" dev="sda1" ino=17342 res=1 22:19:43 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x22, r0) 22:19:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0xff000000, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:43 executing program 5 (fault-call:5 fault-nth:7): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2409.782922][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:43 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x24, r0) 22:19:43 executing program 2: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x20040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000200)={0xffffffef, 0x0, 'client0\x00', 0x0, "69c63eb11523acd2", "7ff5cc84a86cd865fd0a73200fc9d738a653fa774bde37880000000000007baf", 0x1, 0x5}) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f00000002c0)={0x1, 0xa2, "6a21ad1f75ea949d191880f7b75c6e45d79b4c86c34a8ce789e459b3ce8f0944278b56b6c1bbd5fa87f1e9545c7662cfe3b851b58740fc64d14b717948057b6244df84c6096c327a737931504db8b6738cc3bb6966ba59f4b98ef7bd328c4863893125818035b96f5a6b30faeac53b02a4b6c4e40f8b61e9339abb74a86d4993eccbd73346360466a40032b1ba314773c60ff6317d28c03e43a654d1079dd1157e3a"}) ftruncate(r2, 0x88001) r3 = socket(0x11, 0x3, 0x0) bind(r3, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040)=0x40010, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f0000000100)={0x80000000}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000140)={0xc91c, 0x0, 0x900, 0x7, 0x3, 0x7}) sendfile(r3, r4, 0x0, 0x4e68d5f8) 22:19:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) [ 2410.078835][ T28] audit: type=1804 audit(1578781183.582:585): pid=8055 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2404/bus" dev="sda1" ino=17340 res=1 22:19:43 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x25, r0) 22:19:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:19:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0xfffffdfd, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2410.178603][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:43 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x26, r0) 22:19:43 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) r2 = socket(0x11, 0x3, 0x0) mkdir(&(0x7f0000000000)='./bus/../file0\x00', 0x1) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4e68d5f8) [ 2410.519309][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x2000092a}], 0x1, 0x700) 22:19:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:44 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x27, r0) 22:19:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x3, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:44 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x28, r0) 22:19:44 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1d9600, 0x0) ptrace$getregset(0x4204, 0xffffffffffffffff, 0x201, &(0x7f0000000400)={&(0x7f0000000300)=""/233, 0xe9}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@ipv4_newroute={0x2c, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_PREFSRC={0x8, 0x7, @broadcast}, @RTA_OIF={0x8, 0x4, r7}]}, 0x2c}}, 0x0) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000840)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x7c, r8, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x10001}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7fff}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x101}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2}, 0x800) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r11 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r11, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r12 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r12, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000004c0)=0xe8) sendmsg$nl_route(r11, &(0x7f0000000700)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)=@mpls_newroute={0x24, 0x18, 0x100, 0x70bd26, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x7, 0xfe, 0x4, 0x0, 0x2, 0x3280}, [@RTA_OIF={0x8, 0x4, r13}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x81) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001802000000e429a436d48602c108000700ffffffff0800040800"/40, @ANYRES32=r14, @ANYBLOB], 0x2c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x98, r4, 0x200, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r7}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r14}}, {0x8}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2410.924914][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x7ffff000}], 0x1, 0x700) [ 2411.075128][ T28] audit: type=1804 audit(1578781184.572:586): pid=8929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2406/bus" dev="sda1" ino=16895 res=1 22:19:44 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x71, r0) 22:19:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x4, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:44 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0xfffff, r0) [ 2411.299364][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0x700) 22:19:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x5, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:45 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x20000342, r0) 22:19:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/80, 0x50) getdents64(r0, &(0x7f0000000700)=""/66, 0x42) getdents64(r0, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000000)={0x2, "0f2908ffa27bda0abd0aac7b07f3952efbaece827e895811a882eaef548607f2", 0x100, 0x2, 0x6000000, 0xe, 0x3}) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) r2 = socket(0x11, 0x3, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x410000, 0x0) readlinkat(r3, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)=""/147, 0x93) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x4e68d5f8) 22:19:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, 0x0) 22:19:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x5, 0x700) 22:19:45 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x4000, 0x0) [ 2411.743943][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, 0x0) 22:19:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x6, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2411.978039][ T28] audit: type=1804 audit(1578781185.482:587): pid=9747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2407/bus" dev="sda1" ino=17361 res=1 22:19:45 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) getdents64(r1, 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000000)={0x101, 0x1}) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x8, 0x700) 22:19:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, 0x0) [ 2412.120125][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:45 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@ipv4_newroute={0x2c, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_PREFSRC={0x8, 0x7, @broadcast}, @RTA_OIF={0x8, 0x4, r5}]}, 0x2c}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000240)=0xe8) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)={0x44, r2, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'vlan1\x00'}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x1}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_IFINDEX={0xffffff30}]}, 0x44}, 0x1, 0x0, 0x0, 0x10060800}, 0x40000004) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) add_key(&(0x7f0000000000)='.dead\x00', 0x0, &(0x7f0000000040)="04fb9050328d4ead99a65a043fe5836fe3cc7738ed77109172ce6f275ad99bf4cc29e8d11178048fdce1940c8f48d56ad74937200b28ad888477a53c320729abe731d283e31a9540f22d06af1a43671dc5069a267cb124406bf236c6783c80841154aaccf351337a7cf198fca7dfda43d5bfe8ec3c0172a1b1d9", 0x7a, r0) 22:19:45 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 22:19:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x8, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2412.519190][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x9, 0x700) 22:19:46 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x124) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000000c0)={r2, 0xffffffff, 0x5}) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r3) 22:19:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x13, 0x0, 0xce, 0x3}}) [ 2412.609073][ T28] audit: type=1804 audit(1578781186.112:588): pid=10315 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2408/bus" dev="sda1" ino=17505 res=1 22:19:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x13, 0x0, 0xce, 0x3}}) 22:19:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xa, 0x700) 22:19:46 executing program 4: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="390000001000090468fe07002b0000000100ff0714000000450001070300001419001a00", 0x24}], 0x1) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="240000001e005f0214fffffffffffff807", 0x11) sendmmsg$alg(r1, &(0x7f0000000140), 0xcc, 0x0) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1, 0x0) 22:19:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x9, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:46 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) socket(0x8, 0x6, 0x8e) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2412.961180][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x13, 0x0, 0xce, 0x3}}) 22:19:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xd, 0x700) [ 2413.252329][ T28] audit: type=1804 audit(1578781186.762:589): pid=11020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2409/bus" dev="sda1" ino=16893 res=1 22:19:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x13, 0x0, 0xce, 0x3}}) 22:19:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x10, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x13, 0x0, 0xce, 0x3}}) 22:19:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x12, 0x700) 22:19:47 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x5, 0xa40d9de966f19116, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4e68d5f8) [ 2413.781288][ C1] net_ratelimit: 1 callbacks suppressed [ 2413.781300][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x3b, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2413.989627][ T28] audit: type=1804 audit(1578781187.492:590): pid=11665 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2410/bus" dev="sda1" ino=17187 res=1 22:19:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x63, 0x700) 22:19:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3}}) 22:19:47 executing program 2: r0 = socket(0x11, 0xa, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xe) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0xffffffff) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000280)=0x2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) prctl$PR_MCE_KILL_GET(0x22) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r3, 0xffffffffffffffff}}) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000140)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, r3}, 0xc) r4 = socket(0x11, 0x80000, 0x1f) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x11000, 0x52080bc7c25d84f2) io_uring_enter(r5, 0x40000006, 0x5a000, 0x1, &(0x7f0000000240)={0x800001f}, 0x8) bind(r4, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000100)={0x7bc0, 0x3}) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r4, r6, 0x0, 0x4e68d5f8) [ 2414.315387][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x600, 0x700) 22:19:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3}}) 22:19:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0x10, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:48 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x3, 0x0) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1d9600, 0x0) ptrace$getregset(0x4204, 0xffffffffffffffff, 0x201, &(0x7f0000000400)={&(0x7f0000000300)=""/233, 0xe9}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@ipv4_newroute={0x2c, 0x18, 0x331, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x2}, [@RTA_PREFSRC={0x8, 0x7, @broadcast}, @RTA_OIF={0x8, 0x4, r7}]}, 0x2c}}, 0x0) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000840)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x7c, r8, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x10001}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7fff}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x101}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2}, 0x800) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r11 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r11, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r12 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r12, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000004c0)=0xe8) sendmsg$nl_route(r11, &(0x7f0000000700)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)=@mpls_newroute={0x24, 0x18, 0x100, 0x70bd26, 0x25dfdbfe, {0x1c, 0x0, 0x0, 0x7, 0xfe, 0x4, 0x0, 0x2, 0x3280}, [@RTA_OIF={0x8, 0x4, r13}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x81) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001802000000e429a436d48602c108000700ffffffff0800040800"/40, @ANYRES32=r14, @ANYBLOB], 0x2c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x98, r4, 0x200, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r7}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r14}}, {0x8}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) sendfile(r1, r2, 0x0, 0x4e68d5f8) 22:19:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x3}}) [ 2414.740477][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xfab, 0x700) [ 2414.933824][ T28] audit: type=1804 audit(1578781188.442:591): pid=12445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir703160154/syzkaller.KbK1l4/2412/bus" dev="sda1" ino=17553 res=1 22:19:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "200401ff"}, 0x28) 22:19:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce}}) 22:19:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0x17, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2415.106467][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xfad, 0x700) 22:19:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce}}) 22:19:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "200401ff"}, 0x28) 22:19:48 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x11, r0) 22:19:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce}}) [ 2415.496325][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xfb6, 0x700) 22:19:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "2004018d"}, 0x28) 22:19:49 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x11, r0) 22:19:49 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2415.856772][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:49 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:19:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xfbe, 0x700) 22:19:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "200401f0"}, 0x28) 22:19:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x2, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2416.184057][T13472] FAULT_INJECTION: forcing a failure. [ 2416.184057][T13472] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.245918][T13472] CPU: 1 PID: 13472 Comm: syz-executor.2 Not tainted 5.5.0-rc5-syzkaller #0 [ 2416.255072][T13472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2416.265145][T13472] Call Trace: [ 2416.268458][T13472] dump_stack+0x197/0x210 [ 2416.272821][T13472] should_fail.cold+0xa/0x15 [ 2416.277440][T13472] ? fault_create_debugfs_attr+0x180/0x180 [ 2416.283276][T13472] ? ___might_sleep+0x163/0x2c0 [ 2416.288153][T13472] __should_failslab+0x121/0x190 [ 2416.293118][T13472] should_failslab+0x9/0x14 [ 2416.297650][T13472] kmem_cache_alloc_node_trace+0x274/0x750 [ 2416.303488][T13472] ? fsnotify+0x7fd/0xbb0 [ 2416.308207][T13472] __kmalloc_node+0x3d/0x70 [ 2416.312733][T13472] kvmalloc_node+0x68/0x100 [ 2416.317265][T13472] seq_read+0x840/0x1170 [ 2416.322154][T13472] ? rw_verify_area+0x126/0x360 [ 2416.327029][T13472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2416.333327][T13472] do_iter_read+0x4a4/0x660 [ 2416.337851][T13472] ? dup_iter+0x260/0x260 [ 2416.342222][T13472] vfs_readv+0xf0/0x160 [ 2416.346405][T13472] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2416.352616][T13472] ? __kasan_check_read+0x11/0x20 [ 2416.357768][T13472] ? ksys_dup3+0x3e0/0x3e0 [ 2416.362213][T13472] ? wait_for_completion+0x440/0x440 [ 2416.367528][T13472] ? __fget_light+0x1a9/0x230 [ 2416.372234][T13472] do_preadv+0x1c4/0x280 [ 2416.376508][T13472] ? do_readv+0x330/0x330 [ 2416.380865][T13472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2416.386430][T13472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2416.391951][T13472] ? do_syscall_64+0x26/0x790 [ 2416.396655][T13472] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2416.402745][T13472] ? do_syscall_64+0x26/0x790 [ 2416.407453][T13472] __x64_sys_preadv+0x9a/0xf0 [ 2416.412166][T13472] do_syscall_64+0xfa/0x790 [ 2416.416694][T13472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2416.422601][T13472] RIP: 0033:0x45af49 [ 2416.426516][T13472] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2416.446568][T13472] RSP: 002b:00007eff514c6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2416.455023][T13472] RAX: ffffffffffffffda RBX: 00007eff514c6c90 RCX: 000000000045af49 [ 2416.463022][T13472] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000003 [ 2416.471014][T13472] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2416.479095][T13472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff514c76d4 [ 2416.495946][T13472] R13: 00000000004c952c R14: 00000000004e1f70 R15: 0000000000000004 [ 2416.521952][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xff3, 0x700) 22:19:50 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:19:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x2, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2416.842524][T13808] FAULT_INJECTION: forcing a failure. [ 2416.842524][T13808] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2416.856523][T13808] CPU: 1 PID: 13808 Comm: syz-executor.2 Not tainted 5.5.0-rc5-syzkaller #0 [ 2416.865213][T13808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2416.875281][T13808] Call Trace: [ 2416.878574][T13808] dump_stack+0x197/0x210 [ 2416.882932][T13808] should_fail.cold+0xa/0x15 [ 2416.887537][T13808] ? fault_create_debugfs_attr+0x180/0x180 [ 2416.893351][T13808] ? __lockdep_free_key_range+0x120/0x120 [ 2416.899069][T13808] should_fail_alloc_page+0x50/0x60 [ 2416.904281][T13808] __alloc_pages_nodemask+0x1a1/0x910 [ 2416.909646][T13808] ? find_held_lock+0x35/0x130 [ 2416.914409][T13808] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2416.920125][T13808] ? __kasan_check_read+0x11/0x20 [ 2416.925158][T13808] cache_grow_begin+0x90/0xc60 [ 2416.929919][T13808] ? trace_hardirqs_off+0x62/0x240 [ 2416.935031][T13808] kmem_cache_alloc_node_trace+0x689/0x750 [ 2416.940829][T13808] ? fsnotify+0x7fd/0xbb0 [ 2416.945159][T13808] __kmalloc_node+0x3d/0x70 [ 2416.950630][T13808] kvmalloc_node+0x68/0x100 [ 2416.955132][T13808] seq_read+0x840/0x1170 [ 2416.959377][T13808] ? rw_verify_area+0x126/0x360 [ 2416.964221][T13808] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2416.970471][T13808] do_iter_read+0x4a4/0x660 [ 2416.974995][T13808] ? dup_iter+0x260/0x260 [ 2416.980025][T13808] vfs_readv+0xf0/0x160 [ 2416.984174][T13808] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2416.990233][T13808] ? __kasan_check_read+0x11/0x20 [ 2416.995269][T13808] ? ksys_dup3+0x3e0/0x3e0 [ 2416.999697][T13808] ? wait_for_completion+0x440/0x440 [ 2417.004983][T13808] ? __fget_light+0x1a9/0x230 [ 2417.009665][T13808] do_preadv+0x1c4/0x280 [ 2417.013903][T13808] ? do_readv+0x330/0x330 [ 2417.018227][T13808] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2417.023681][T13808] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2417.029130][T13808] ? do_syscall_64+0x26/0x790 [ 2417.033799][T13808] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2417.039855][T13808] ? do_syscall_64+0x26/0x790 [ 2417.044529][T13808] __x64_sys_preadv+0x9a/0xf0 [ 2417.049201][T13808] do_syscall_64+0xfa/0x790 [ 2417.053700][T13808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2417.059579][T13808] RIP: 0033:0x45af49 [ 2417.063470][T13808] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2417.083068][T13808] RSP: 002b:00007eff514c6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2417.092352][T13808] RAX: ffffffffffffffda RBX: 00007eff514c6c90 RCX: 000000000045af49 [ 2417.100315][T13808] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000003 [ 2417.108275][T13808] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2417.116256][T13808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff514c76d4 [ 2417.124242][T13808] R13: 00000000004c952c R14: 00000000004e1f70 R15: 0000000000000004 [ 2417.157087][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x3, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xff4, 0x700) 22:19:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2417.522595][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x4, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:51 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) ioctl$sock_ifreq(r1, 0xdb, &(0x7f0000000300)={'virt_wifi0\x00', @ifru_data=&(0x7f0000000240)="2850dcf132befa301f71270fff1805d618b4909aab2914e7e11cf44e72a8fbed"}) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x800, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x4, 0x5}, 0x0, 0x0, &(0x7f00000002c0)={0x1, 0xb, 0x40, 0x401}, &(0x7f0000000380)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x1}}, 0x10) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0xa8800, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000500)=[@in6={0xa, 0x4e20, 0x81, @mcast2, 0x6}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x25}, 0x10000}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}, @in={0x2, 0x4e24, @rand_addr=0x8}, @in6={0xa, 0x4e20, 0x7, @remote, 0x100}, @in={0x2, 0x4e20, @rand_addr=0x1}], 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0x6, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7c}, [@map_val={0x18, 0xac8f5541992bc7eb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x6}, @generic={0xff, 0x5, 0x2, 0x101, 0x8}]}, &(0x7f0000000640)='syzkaller\x00', 0x56, 0x89, &(0x7f0000000680)=""/137, 0x41100, 0x3, [], 0x0, 0x4, r2, 0x8, &(0x7f0000000740)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x10, 0x0, 0x1f}, 0x10, r3}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r3, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x22}, 0xc6}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @rand_addr=0x714}, @in6={0xa, 0x4e24, 0x5, @empty, 0x26}, @in6={0xa, 0x4e23, 0x6, @rand_addr="22e0346d9298f29c0df42930e5ef40d5", 0x3ff}, @in6={0xa, 0x4e21, 0x401, @rand_addr="86240a398f6c3ed5ae082e3b1173ca37", 0x9}, @in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x1d}, 0x1ec}], 0xbc) getdents64(r1, 0x0, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000000)={0x7, 0x4}) 22:19:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x125e, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xff5, 0x700) 22:19:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:51 executing program 2 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:19:51 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x80000000, 0x100) 22:19:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x2203, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2418.012335][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x5, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:19:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xff7, 0x700) 22:19:51 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000300)={0x7, 0x80, 0x7, 0xa0, &(0x7f0000000040)=""/160, 0x88, &(0x7f0000000100)=""/136, 0xb9, &(0x7f00000001c0)=""/185}) 22:19:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x2271, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x50}], 0x1, 0x0) 22:19:51 executing program 4: syz_emit_ethernet(0x89, &(0x7f0000000000)={@local, @remote, @void, {@llc={0x4, {@snap={0x0, 0x154, "7f", '/_5', 0x1c, "7c2158832bc0d8fce6d4629aca6f6e7e2e1aa0af74bc406c82bf128d6b8d8e25f5a49c00a2f00d8b7417b6e5111c4636fd35ce218771f9696cbdb6cc74226c265aef180b3e35c57cfccc0a2f446780aef29767c95e8fa8c365117fab988ac7a56c4196c3b6c42c00fe97e08d092727516fcd26"}}}}}, &(0x7f00000000c0)={0x0, 0x2, [0x5d4, 0x3ab, 0x3c2, 0x1c2]}) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000180)={0x8, 0x4, 0x4, 0x64244804, 0x0, {}, {0x3, 0x1, 0x20, 0x81, 0x7, 0x2, "438bf3df"}, 0xfa5, 0x2, @userptr=0x7, 0x9, 0x0, r3}) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000140)=0x1d) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x101600) 22:19:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xff9, 0x700) 22:19:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x2403, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x6, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:52 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000000)="04", 0x0, r0) 22:19:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0xac}], 0x1, 0x0) 22:19:52 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x100000001) 22:19:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xffd, 0x700) 22:19:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4c00, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x2000092a}], 0x1, 0x0) [ 2418.871307][ C0] net_ratelimit: 1 callbacks suppressed [ 2418.871318][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x7, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:52 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000040)={0x6, 'syzkaller0\x00', {0x8}}) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='id_resolver\x00', 0x0, &(0x7f0000000140)="1133805da29ed487ce949f04523c6f00725679a105be9378d7cd0041d534ab3a4de4b1ac191936afb2295436309386a592eb0dd3f46dae17302f4135ecc2988ab5a29b88dec246379effd7cb6640335424147587f11929518853e44325a9e2ad064d7fe6e2e7fc7a4345ce53771ed04ab1ed", 0x380, r1) prctl$PR_SVE_SET_VL(0x32, 0x20c27) 22:19:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4c01, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x52) 22:19:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x7ffff000}], 0x1, 0x0) 22:19:52 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='encrypted\x00', 0x0, &(0x7f0000000340)="04", 0x16a, r0) [ 2419.279316][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5405, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0x0) 22:19:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x8, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:53 executing program 4: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80201, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r1, 0x8004500f, &(0x7f0000000140)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000400)=0x16, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) sendmsg$sock(r2, &(0x7f0000000380)={&(0x7f0000000180)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)="b2aec23fbaec26d75c4b52076b00e3b38e37477811777910d0b5ca3839df9c1f76ff11055ba10f847eda33dbf6fb6ac66f8b946fad50ccad5672053cf35db0766c9fead6ab51c40a2c6f88c22998585344cf3f5ddb42020bc1942aabe2df7f6f96c5091d4239058496a6d70d678567ea", 0xfffffffffffffe4b}], 0x1, &(0x7f0000000480)=[@mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x2b1, 0x1, 0x25, 0x17a64f2d}}, @timestamping={{0x14, 0x1, 0x25, 0x80000001}}, @mark={{0x14, 0x1, 0x24, 0x400003}}], 0x60}, 0x800) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r3) 22:19:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xb0) [ 2419.632619][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x5, 0x0) 22:19:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5421, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:53 executing program 4: accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000300)=0xe, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x81, 0x0) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000440)={0x1, 0x800, 0x4cfc, 0x40, 0x0, 0x6}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000100)="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", 0x10a, r3) 22:19:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x8, 0x0) 22:19:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x111) 22:19:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0xb, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:53 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000040)="1ee3d4f754d0f00d803fb4e0bd815f9d32064f5f6caf6e713191284101c72788c8455fe3727ad778d2bc06e933f9fa84034c6fc73d294cb71b956eb8e4f9ecec5afbc636564169412bbbc038d4645f9874a1bb89c12dcadaa53f55873370a15b743902314370f28867a9650be73fbd030d30050be863cd360f7347", 0x7b, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000100)=0x1) [ 2420.186201][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:53 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) 22:19:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xa, 0x0) 22:19:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x166) 22:19:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5450, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x3b, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x12, 0x0) 22:19:54 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000300)) timer_settime(r0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)=""/163, 0xa3) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000400)={0x8, 0x8, 0x4, 0x100000, 0xfff, {0x0, 0x7530}, {0x4, 0x2, 0x8, 0x81, 0x0, 0x4, "7b76e21f"}, 0x9, 0x1, @fd, 0x6, 0x0, r1}) ioctl$USBDEVFS_DISCSIGNAL(r2, 0x8010550e, &(0x7f0000000100)={0x8, &(0x7f0000000480)="2e087760239a0da5b7528d52d5ab4e78823e160fbee80e8b4d502bf1606a3a9f39585b36d946b1afea227e6255eff5ad798f0362d300e37d9a4698f67f74fa99c993630db8df76e18c39fe687b89de229a90f285f9f9f302f7715d5546d2dbc27d99744aa1a46190258ab1c18902a506213b81b777d6fbac9e46ac21170fc5fed001f11114e4faa938510011a0af7fa105894ac6c7e1ca3ba63e95720acfc3def8c72cea88913e078f029f1e3a64d1575a6217d08c425a9c12ffe09e"}) timer_delete(r0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000080)={r3}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r6 = open$dir(&(0x7f0000000600)='./file0\x00', 0x14200, 0x20) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000080)=""/80, 0x50) getdents64(r7, &(0x7f0000000700)=""/66, 0x42) getdents64(r7, 0x0, 0x0) renameat2(r6, &(0x7f0000000640)='./file0\x00', r7, &(0x7f0000000680)='./file0\x00', 0x9) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r5) r8 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='\x00', r5) r9 = add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f00000001c0)="050327bcce145f883f00000083c3ca6439597774a8ae31d188084e0ef620d8c481a7c4feadf0a2d38c37400b8b34790480411634e2359d97e77ad130e3b948bbb77f4b50c9e19945bd584772fef695da72c7dd8e2614d601e79f9f459ca67d", 0x5f, r8) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, &(0x7f00000006c0), &(0x7f0000000780)=0x4) keyctl$invalidate(0x15, r9) [ 2420.557149][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x1bb) [ 2420.667032][ T28] audit: type=1326 audit(1578781194.172:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16487 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45dd8a code=0x0 22:19:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x300, 0x0) 22:19:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5451, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x212) 22:19:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xf70, 0x0) [ 2420.976378][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x300, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xfa7, 0x0) 22:19:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5452, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2421.229603][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x255) [ 2421.487240][ T28] audit: type=1326 audit(1578781194.992:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16487 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45dd8a code=0x0 22:19:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x500, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xfa9, 0x0) 22:19:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x5460, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:55 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/80, 0x50) getdents64(r0, &(0x7f0000000700)=""/66, 0x42) getdents64(r0, 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000000)={0x56aa7e4c8ac53352, 0xffff, 0x1}) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1, r1) 22:19:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x2a6) [ 2421.704029][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xfab, 0x0) 22:19:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x6364, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:55 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000340)="04", 0xfffffffffffffff0, r0) 22:19:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x600, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xfae, 0x0) 22:19:55 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x103200) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r2, 0x40044103, &(0x7f0000000180)=0x724) r3 = gettid() r4 = gettid() rt_tgsigqueueinfo(r3, r4, 0x3d, &(0x7f0000000100)={0x100000a, 0x3, 0x40}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e24, 0x9, @mcast2, 0x6}}, 0x0, 0x0, 0xb, 0x0, "aec5e8dd424f84d0938ead0b87c88667916f0784098d5f16345213219a2b4cc31b0fae67ab5c7b45bab7cd09572e17b5f43d9338ca189307d1af00dff7c261f2874d54ea88d3d2dddf122c64486b431d"}, 0xd8) finit_module(r5, &(0x7f00000001c0)='B\x8b-\x8e\x17\x85\x05\xe0|L\x96\xf6v\x8bmw\rA\xc1\xca\x9e\x97i\xac\x88\xfd)\xb7oS{B\x9d\xc9\xd2XV<\xedg\x9e|Y.\x91\x055*\xc2\xb7\xc7\x19\x8b%\xb2\xdd\r\xba0\xb1\xda\xdfI\r>\xec\xb3=\\3', 0x1) 22:19:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x2eb) 22:19:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7001, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2422.112557][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:55 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000040)={0x0, 0x5, 0x4, 0x70010, 0xbc, {}, {0x2, 0x0, 0xff, 0x9, 0x9, 0x1, "eea8c413"}, 0x8, 0x0, @planes=&(0x7f0000000000)={0x1f, 0x8, @userptr=0x2, 0x8}, 0x7f, 0x0, 0xffffffffffffffff}) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f00000000c0)={0x100, 0x6}) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x700, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) [ 2422.297325][T17881] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xff7, 0x0) [ 2422.384108][T17980] rtc_cmos 00:00: Alarms can be up to one day in the future 22:19:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x32c) 22:19:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7002, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:56 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r2 = socket(0x11, 0x3, 0x0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r4, 0x0, 0xffffffffffffffff, r3) sched_getaffinity(r4, 0x8, &(0x7f0000000100)) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000047c23cf581d53863e598f70d0e3b9eac43e724e8d3531f32d653da8859973037b070fe", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={r5, 0x1f}, &(0x7f00000000c0)=0x8) [ 2422.491753][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xff9, 0x0) 22:19:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7003, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0xb00, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) 22:19:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x376) 22:19:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xffb, 0x0) 22:19:56 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000340)="04", 0x1, r0) 22:19:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7004, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xffe, 0x0) 22:19:56 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x3bb) 22:19:56 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x14c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x3c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffff80}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xada1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}]}, @TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xab}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaa9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x75}]}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4000000}, 0x96b5c59fa4ea08dd) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) 22:19:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x3b00, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0200"}, 0x28) 22:19:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0xffffff1f, 0x0) 22:19:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7005, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:57 executing program 4: syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000)='NLBL_CIPSOv4\x00') openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40a80, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:19:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7009, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x441) 22:19:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x2) 22:19:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0300"}, 0x28) 22:19:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x3f00, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:57 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r1) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r2) 22:19:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x3) 22:19:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0400"}, 0x28) 22:19:57 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0xffffffffffffffa4, r0) 22:19:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4ad) 22:19:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7010, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4) 22:19:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x8912, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2424.087866][ C1] net_ratelimit: 3 callbacks suppressed [ 2424.087877][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:57 executing program 4: r0 = socket(0x11, 0x3, 0x0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) r5 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x5bee7f64, 0x1) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1060c6b0}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2e9b7c907789b5f7}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x2040041}, 0x24000000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x0, 0x0) r6 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000140)={r4, 0x2}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r7, 0x1000}, &(0x7f0000000200)=0x8) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r8, 0x400, 0x70bd2a, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0xc2c3}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000835) r9 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r9) 22:19:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x4000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x509) 22:19:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x5) 22:19:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0500"}, 0x28) 22:19:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x8933, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0xff00, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x6) [ 2424.534707][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x600) 22:19:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0600"}, 0x28) 22:19:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x8982, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x7) 22:19:58 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000480)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r4 = socket(0x11, 0x3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) getdents64(r6, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x1) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r5, 0x4010aeab, &(0x7f0000000140)={0x2, 0x1000}) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet6_mreq(r4, 0x29, 0x0, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x14) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14010000774e8803840d283dacea7e3258866cda4f9e5f543c59c8152d709dcd824f6a07261ce167ba680e29b877421c0524f5f2298a7f88ec1995d1f4bcc7e902ccc198cda5b364ee80cf7e5db7", @ANYRES16=r3, @ANYBLOB="100025bd7000fcdbdf2510000000080005000a00000008000600020000004000030014000600000000000000000000000000000000000800030002000000060007004e24000005000800c100000008000500ac14140e06000400030000001c0003000500080007000000060007004e230000060004000800000008000400020000002c000200060003000500000008000500381c0000080007000848000008000800008000000800040070ffffff340002000800090007000000080004004d05000008000800090000000800070000000000080008000500000008000800000000002c0001000800060073656400060004004e200000080008000900000007000600736800000800060077727200"], 0x114}, 0x1, 0x0, 0x0, 0x71aa31f471f3f45b}, 0x80) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) r7 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) sendmsg$kcm(r7, &(0x7f0000004f00)={0x0, 0x0, &(0x7f0000002980)=[{&(0x7f0000000180)="2a3a065f8b47dfb721e8d8d46ee3396610f954fff2daadd8f1cba0a47fda82d57b5d43828ea4d9c5fe6546cf3f24890757c7f8cfa211ac988f85e5572ed5cb41b013f1caf95ff9480f6d0cccb78f86b3b4b82f96631549448ef346298d", 0x5d}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000000200)="b4f288fac295a2767431fbd5fd72d0e2bcfc6451e9d7fe2e2d565dbe6dfa9f308bb964de2ca05f7d474d19a68de5b6675aac9f08f5dcdd74d93814721ba722b8c662099943dbec7e", 0x48}, {&(0x7f0000001780)="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", 0x1000}, {&(0x7f0000000640)="1694342b079667dbb9b75fef6a601e68ba6cf2807d73bed8c23980307c3a5a1b68f6b1af88de59d78cb542d46fd7003b765af7a5c58ee9708b45be2ff333f043c6a93cd2a22bc5525f3985021520cad7a6d6a110a17f6aee7d228a251f04b6f49a3e64a5f2e729216240b359073f186a173e50bab2bc1f10be1bf4abcea3e85d311badd0217954c6d91591fb30bb", 0x8e}, {&(0x7f0000002780)="3386c0e1681b8e7a40118e72a6550b9282aa1575a92a0c12e5cffeaa2487261b99c1895d13be19eec24d4d3516fe198b2c4986ae88d0cfea44d0", 0x3a}, {&(0x7f00000027c0)="e6c6c364dcbaa44e8b6d15b0cf8f33395e321712424b56c1e1e9c59910f2351f7d61529019125bb798db80ac96c1e521d17bc37c72bf27b242f4074a56612a7c9da9a23894e4412f79c0dfb2259940509032d8069ce2fe0343a0f59948a33615415dbf638c83998551babca8eb04fd6790e33d98c93f001bb457a579b83bde269c5a4468fafadfee6d8d221a23cc78676309871387ca8dc2df181f699d8c7c1492d72cb1b6ff02819e55a187e24ef0ad43c0e4597241e8188233a39456b102f4a42f81d3ccaaa9bc6d89ca085db73de8ddc064a107f37e938493", 0xda}, {&(0x7f00000028c0)="da83d10ebb1b", 0x6}, {&(0x7f0000002900)="5e7b274311b02a400008384b618f96f5c40a2858aff4e8e5c0fc6338b3d8352b7331822fcbacf8ed33d9576b1124ec6725", 0x31}, {&(0x7f0000002940)="e0b85f1203c7cc791ab48e1cb657329452f7fbcadb3d38bc", 0x18}], 0xa, &(0x7f0000002a40)=[{0xd0, 0x115, 0x1000, "f1e76abfe7d0f48765396b871399f3b355a5a9106481e3097f413ed873b09eac81dbbf58e91d6cf5e51884cce778472d17fedc97c282451e22a2a9387264422290656a1e02dba8c802d980364ea82bb5b3ef7894029147ca2645810a8e2c97cf1d757a94043d4c9aa151a09919c6d72ffbcedd603fde5b582b0ae35b5125f0e9ba1bdcfe38cfd2880e7961c44ae4f3376ad9bda66ed66f0fcdc34f0a73d708bf849605b2a872e98201b64f8225de39c5a9fa7fe09118889d8984c509327f"}, {0x1010, 0xb6bb26b170b030de, 0x10000, "b689a95a945360a957a4c7f75c455da729a8dc17919f97e5cecf41ea5359f247d2b959d35efcc4ca04c6e164457922f6a6ee63645356f6921fac5c7cd1456048c82871174a1e30f16e70a1c472aa0ac1c5ed7fb977b98264b5b30d501f3010ce0bac0ed1c4931e0baeaafe55bb7f28770207f6a97fa717eff2791b219fce386a1e9435bee50dd72a45b41e9dcf4d2fe260ca45d557ec835dd5320b07a9d86b1b4bdebdc9a824115c920881ec903b9a44d02f0834ef5e5b60fac52f1614d3f5e759b9b5d42652e41bff5384292e87329da270814d7cd3d4b8855d44fc31e8e71b83da3b1147981dcf406a5101a26a53dbff3a7111f25bb07fe213b7dd3f116613fadfc3d857a9fcf232613417be7aca55a2ab2ed9db681f0b53141251c264a214e511869c7b33a68a636253d5b0af5fcccaa3c714ef9a9cf62880ed2475f5a462f6af26aec5e2ecec5729d4b52cc52d4609c58ca9ca23545b649ff3d0901ea2f7f49f44eacb9ca5e989118b2631d79023d2d37988eb78223ac105dd92a8b27bf2523f3fb2de8969b08d565b9e349a614add1b5227a550ccbffb3a3c84d73ad4437b547e9a7a01fde8dfb83c8b49e8b0deccea8b3ea5677cfb7afefe6704140881bd175c1f32ccf61de340e352b8be0c684c9bdb463a9170e7f6a81b8603aebe8045ce25353df467d749cd276a42b3f375481aa95986c12c220d8c05f35343046da2d6696ddfcfbcef5d3d6ce2e7236db838eac97df433a835c205ea4291203f153a96e298b3990e8ee1c223e014116f16ecedd10a3281e54efd4de4558bff3285ab0469710f6e7a2d0eb11d77a83affd6e20e217538762c359e3b43ba29cf64e4cfb31f20fd2accab002b974f15eec6cb9fd1b6d68a628174b8cbfbde7f231f62dc2ba6d884b0432600a269220ccaa922e1b5a39208d41c885cead22ce394e329734f329c46d6413b309cffae2ee1fc9a31fb0ef554fd65b29bec095bbb59b6bc8bdbbc4fd1c3722aa57854b9e62d8c0a88b3c0dcc74abbe996fe618321f0282afc8159c15312bcb69b1546ebd432901f4b8ba47d21c1513d0955d5d043adcf3e5406e4517d981ebf2a8e79962fed87d49caa0a59cc3a30b6b48c5480b6dd0bc671eebef0cfd84ea888462f19cac3bde185bce45e6c875194eb25bf55c9fb2df3f028fe18a2505026b94f4f86c0dfdb31bf1d155bccbfee5c41c68e5c880f4ef9b6a5e7791f35695f96d3530235f425078ffe8cfb891d3620bf127d59b4b802acdc266d320930ede5d60ba0ac8edeefe905a440957220a66ca6eec6df18b02c9fd107646975f4c173b1309ffff111daedeffff9fdbf9a31a5da236d90cdd0d9f13976e6d992fae6efc426123a334c7d888f0463a8c7f4fe3430830bfc6c6220de4ac8659e6530fa493ff29c951d823b06464ea9ff1220d2b7f1d8991d25a9760c73c9261f7e1ea930f645e01eb9f48b9c28df4489b9fa9398be28f67eab386f45ebf9ca3c25c25813f698de0c3fc34557624c35f88140c04550a4cd32c8894403b0aaf12153d45e9b6213900209bc71750d9a8185dacf725eb2bf43a2c9c44c7e07298af42a89af4b9aada9767ff6c786e47f22dbadc76a2b658116e42275095f9d72963f9498ab17e3e3f3916a24ceef9aad30a0b3ef7fea32ba612babc0649bee6f164f04ec4eb51dc4656f1a18860eadf37d9cdfa1295faff5ebc9ce56f5aaa00f20f6288c4531d17173827e949c78c2f04c703b136e9ebac004915d52ae5ab435dde8580b1affd69aa617c715840194ee5b6e7382b95633121f802900acae5579ebefd5535b0254f087c7ff2143a70781bf7a1ce4d1441cffa19b786fb01777e42e164d2c25391112e1dcac3742f8f8acd59286e1acef12571bfffd67ed42d9bc0e880b3ef75b5a968fa16559a88f8e542813e2a41168f037e4d3afd8fac57bf1ecff1ef98e9dec2b5572905198e9291182562f5b3f63d8ee2e5f538abc3875a36ff1b4fb6ff272949ae1a8df578f1b81d103c7e62c973da338bc8d9817bf1899c6d3f0041539398240210a87f123b803cae20ff2498f7cac21ee7e68123cb4956c9cd14901c03302f721bdf45e85a82c0aa9145eac05444ecb283b8141799f2f2356a028f844aa5b6c93704d3cb4fef4cb5008ff77c1ed9d79bec8f3b45509f957d06234f66b87d311119104ee9bae4e77ab8907f83626c1815498d8137d1ded5a517402d3956a2f3ad4e7f5f73f1cdb8cf60a4b6055bc1d0f4d3fcc168cc05e4b3bc3812aebe2aeed3982386d349182bb20a8ddf5e834f3b4b54adb651b59b473a6318bd508aed0559dc73b7523a4c07ba6fab2924cc5e3aa01aaff9684e2f34ea819886e35fcb7fb6d2299e21e85ab9cf1327441c0963fc6626aece3073a0da324d726818eaacea54179fe0d255a9a1fa1a26362c8f87d240ae55706f84d42f8f56cbe3ee43c2522a1e446eff6bcd67119643b74664149e61996c754fcf73f6c9f41bf768fe838e0364c0971db27cfcfd74620132bfe0b871853d4e92a231444d03c56b59485530c93d64f026249869537718c94a560729ce06886ae8eaace449f37cf39caa89a44ffe93451d56e6a5d9665e2a18e556fc197279650ab75f9c3e501254b37ef6235d663c3ceab7b1bccbfbe7cd75efe012e173a2ee7c3ae7c72917404df4ad9bbbbb3d78e836c9d192f8f8a03cff2074f6ccd0c7853ec08d2d7c9d31feba35fa7bf5638edf78f31b886d589c577818d18b7f8d410dbbbdb9433a72f29d09c5626e02cbb137c715b622085c9e88e72c68ea1551974c3891746993d9a31004ff34ef0b55b7e402f0ad0992850ab2216d36a84762ca07e64992bc82515d42ee6fadb2b8ef9ed566f7ec94233856e57b43220f46dce64c88974eea3bfdb5b594dad3f2d929f45f8a12dedf753c286e63140a7418bfbe98cb6f8b5236780734cc8a758935ad4c60b56bbb57859fee3d47d1873c27f802aaef00491c0febf5e274be9c20231e5634a4ea04149cce578e638d46921fdc91719d8a4d2eb2ff4b4e75f311012c01b28ca95112527fc986c3b060b5a10538bea0ba15af86ba3925e993a21412454c304b86fc795c9e1153475a8c06ef4ff234e7ab8ee7cf34956b4b15a307b51393142456c3d97b4dc842511048f0bdb2b08202fd526cf0852109ff03c431b2b69908e97684992ed94f02c7dc5329d4f9bb5f20222235978b2b0bfe11ececfd7a7100ebf0410351dfa9a5694c526c13e957adcf4917c21ee195906fd0182d8616e6cdc892323948f45233e2452cad24912e9a53d46e426e26311016b2257634825d1eadf488d69cf87a3f5d98e128e722a2229c303952754ba187473bdb6f9a90f88f105d5c0d468061ed289255770da5606ce8e6e63e41186239a0d6c8be1fdf84ccc7a625e3a0a5dbc895948d1cdf07b46c9b6756356c55ecbd137e3a04f59f988ddbf7a0bb78ed08633ecefa9e3d94bea13b02d698b7bca07606b650bf54457c2f2f9f5d3bb3cb2c62e12af5b5f928b681805f3e8b02828e1646febc04bbeb2b98b8dccee555f9355e091f88cafe938e1e47ba03b205cc0b4dccfdc6cf2f48788ad8233dba92e027728406f3685c8acb8ebc99b9843dd4c246af2ebeb07eef9a9f74e50f39da7b702e879c490232d7be23065a069bdd22977238d18a0ba88a59029d548167d4e330f34183e8ddbda75c6504f7974558ee55cd1dcd46a3d1c6b17799842ccd75bd9297028a6ddab667773517a7ac463944462771f376584027a9bff70bb5c5b38d40d09cc4e14cd6cf8e1d983721882a18bd0085101a06528c542521f712bdcafc342a04f505662cfda2437cdc40bccb64d2eae7fd6b1ac14bfaf3562506eb2576043ee993fcf2df30e6fdcca9dc8bfeb3066ad8d43bf6e1faeb333ae171910acc1951c6a7a45d09f4a9dc52de7c55af9f2f1ee1ab33ab004ac3c99534335040271f42984904b61f117d6036570b0cff285b6288270ea88bef9eefd5707324d206171366f82f6c732f61ad8cc7520fcefb857f325bcdfbb8dbe0a7998af335651c256f4e8c0b6f0553d97934cf8a18e30fef2f052e60d6483ea8486555faf9150283bf1970295a8d297480c0a1563baf1b5e02771ab7f3f19d353fd759e0f53a9b78287cae90aaf97ec1fd94555e13fbf4ad5782c23b25df33ee3c12111dbe80a4480aa97638f128f4aee0555b5997f96c837b65d0549007258cc290d8d9874d3d41fb8d4d6478b031b8e3da3c53580397afb505b2420cc2540dbe93f29d7d31da7bac0f55f11b0e965776aa8126dde6f7792cdff0aca9fca28275c3f399f542a8025deddc49614fcefbfecc7bcceb1cf0ad15f8f90868fb9b409d0f9392ced81b8b3c9d8decf7d132712f4f140b75b7601c5e12130ceb57aec82a7a4bbcb808f4498e9ebb16bc8f36fa2861ad4d08f17059f26d155b2aa78deea1ac727a1d091a7273260896bd5113bd64d22eda38cdd74932edc830984a27c8e975cfdb20b72f39d59eb02cfacbbfb03b99ede5be17d20da0f9f6ba392542815f5215bd33072ce7eedb6b9ff8cd2ba8f333a95666acd66165c7e01a0ac7ea6c38747228cf459c038605d3bb0b078e6aa46a4d1f12cb8364c3fef395b4a059e1afff900216e544683c79e6ff28dc507195e5c58ab795eeeb00bc296c439752bb897dcd3ee1da1b218e21d566d9979ee5ff4204b0555a1582ea4b58e70abd4ab25223d366f261112f86a9f5ebd799d2890d36ec1f9171ee766410c974cee2bc75ac00c0b51631c0c1d2f5c66006dff17b2af8f6915c4728133b29c266270753008f5c950d8d2000b2e24b61cb6a3c14ee1508a78f6945548d0a9a24a112acf00392e55543bc3ed4faa03b1d34a3b7abc545b0c7df9a2c3c9e7c215cabd5c6ac6759c68d235aca3d315c2d0555bf9cfecbc62edc3ea032e64bfd0d4c41e83775640e493e927b6930957ae5f14a97344c7b3cd9dabdc7ea939e7aa0bdc7bc983cce31fe4b3249ae33bbd1628f9e8f33625775f54db3fe0b829bfb0eb50cce5cba8c83b6f3840b5bede98476f51a9548464310e4c755385e6d96876e76756dff245186c82b9c0d92ac111037bfc1a74c662e8c8e873b6a9a00c62538fc02ae3b97912d0fc459416bfd8a85ca01e473654a33203d37ae9c0dbaed91d3a2605cb952674f2e82ebd3f4597601177333a5e5f351cd0b29801a7dcd26bbdb43dab6f58ca1eda8ab765784d0911a88771c82551e1f42b6f0cafb1c4b330cb337f88c528fd64f816d7fd89e65bb2d3738193b1cb0d4c8f7038614db143fae61882ffd3d7ba0683898f937cab55961f5a3f992fbe4da462d13675052b2638343168984cefd35e10ca50b64f714693d2acda8837c5878582fe4095a1babd4b5d81cc8b3c1c4b1a99bb270bb1af36177569eadd9f9f5adc02d0d6a20d1cd53b174810fe27fb47ec7930d969ac451e3ac5b19817cfc59c8cbd3d73e579107700003cd7461f12e161e2c909e10bef24d401c3824defead3d76e28a8bff3056fe46af36558bd620c3a0ed7c1978b72f390f773a8c07fbaf41b953dee845f98743c159fe8df0e0984575a0721bf13b9d53d0a1b72b64997e89e8d9c83ce8360b44a1e40d460f4ecaba20136c070cbbde2e38c3234ed88dddaacf3622c9c6f0a1a0e4ff9d5f108e2d40316df490b6258e067b002ce26c122b80b91fb8023e9c47bff396a6b6a692ff87bf9b70cfa6354d529e9087ca41308442e6a8dc4f279185909a99d6a37f3fd3a24ee5433ec3975cf801bb2ddc55b29d8ad085da6"}, {0xf0, 0x102, 0xfffffffa, "3e70ecf88d351773839b2cf28442eeae1489240d5713e62dc946a22d629a9ba9bb7171620dc8b4cd8d29fa24cb7c458a41b6bd08e99934afd4bf518f671998b30e47a6685d7ed29db654bc9cbadc22931a87832a477d65db69785eca87b2c4d2619d4efec8ae21aa77b811ba5ca571f24d3fcdbdca5f1f1c28cdcb465570c2aab89ad3319a8d5b0810eb3c870ab4971fae757b20814b7a97ff1eb337ff82af52cc9522206ce1076b2b85823434513dfea4b5afe1f1e835c39e1beeae3e7e8b4193954860f971f2d52487aa3290bb4a2423ea0667bebf1785a15d699141cd106d"}, {0x90, 0x116, 0x5, "2a311c02014aca9427b5819e7c6fb6989db2b09d162f5c3797f022d790ac8e612bd4b72ca19a4310a662fdb85c4fa8b403c43e74164dbedfd9db5cc9597aff75202a642722212bb9b10604c886ff2a0ff58661e7c86024fcdec8b998cf4c253ea92e2f077475b5de1e497679530eb5ff64bbc4b5230e0c4b61edd78c"}, {0x20, 0x105, 0xd72, "3477d82522aab48f58d96e87d3d41648"}, {0xb0, 0x10d, 0xb3, "19e04292249ffd4073035194456cc0d22d853712abf33e0b8e73c674b6b977cae70a84a68005564480cb6d62433ed69559abd76ef4abbd72ceba8da4f8d66729ce2f1817e459253df3645b0b267d67ed255aab76327ca1fa12d39157191fa7bd609f72defa58f3e31a26521c39fed60461a9de3318d97ee320b967c473d35621c058b8bbdae6528fe5f8cd953de7241d94fa1da1c5518e8539b1"}, {0x18, 0x194, 0xffffffe0, "1bddedbbe18ac0"}, {0x1010, 0x1, 0xfd7c, "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"}, {0xe0, 0x10d, 0xc0, "c2def491a5427aaee8c519be2eda951afec97609eec3061e2cc138f399323e4b01d21854bb99a77fefeff29e54727be044490a8704e093e1c382e8a8d738b0a3e6ec43cc54c7ea1f1a0227f21e8605836acc72af5ae9791f275757eea70171636b06129af36f22dee912198a40e13ab86cd1e398b5a35fe7761e11c16fbb2beb5c88c87cd80e74488100a5d9761523c818a84edb659e23a6c89ffa5b5d580a3bd67fc9075a15ff763d0136c204d7ad37e7d4f116c71fadf550ee6fa9ba65b0c264f99caa17b7f632858d3dd68913b738"}, {0x50, 0x118, 0x7716f415, "448e5c26cff5b2913040bc5e1f20f48e6dbee7907f566b516d8dd3200568213436d862981157c3405f14a1181182fbabb3c71b661b219a981c9b6c10"}], 0x2488}, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) ioctl$sock_bt_bnep_BNEPCONNDEL(r8, 0x400442c9, &(0x7f0000000040)={0x1, @random="b051de0ef1e0"}) r9 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x4, r9) [ 2424.853447][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xae01, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x1000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x702) 22:19:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xa) 22:19:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\a\x00'}, 0x28) 22:19:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x400448c9, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x10) [ 2425.253392][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:58 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x1, r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x1) 22:19:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x703) 22:19:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x2000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\b\x00'}, 0x28) 22:19:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x12) 22:19:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x400454ca, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2425.673953][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:59 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000500)={r3, @in={{0x2, 0x4e23, @remote}}, [0x9, 0x6, 0x7ff, 0x8, 0x4, 0xfffffffffffff000, 0xfff, 0x9, 0x1, 0x1ff, 0x40000000, 0x10001, 0x13, 0x0, 0x4]}, &(0x7f0000000380)=0x100) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r4) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) write$rfkill(0xffffffffffffffff, &(0x7f0000000140)={0x800, 0x1, 0x1, 0x1, 0x5}, 0x8) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0205649, &(0x7f00000000c0)={0x305bd83aacc081a0, 0x0, 0x77ed, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990af7, 0x8, [], @p_u8=&(0x7f0000000040)=0x1}}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f00000001c0)=0x14cbdd5a, 0x4) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r7, &(0x7f0000000080)=""/80, 0x50) getdents64(r7, &(0x7f0000000700)=""/66, 0x42) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, r9, 0x531, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x5d9f57f757f02975}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0xfc, r9, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x24}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_hsr\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x27}}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000000}, 0xf6fa3716b9d78568) getdents64(r7, 0x0, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r7, 0x8004500f, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000100)={'caif0\x00', 0x4000}) 22:19:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x3000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x2d) 22:19:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x704) 22:19:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\f\x00'}, 0x28) 22:19:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40045612, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:59 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x719e, 0x480) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x228) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r2, 0xffffffffffffffff}}) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) 22:19:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x48) [ 2426.069593][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:19:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x705) 22:19:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40049409, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:19:59 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, r3}, 0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={r3, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [], @broadcast}, 0x1963}}}, &(0x7f00000000c0)=0x84) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r4) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400400, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r5, 0xc0045520, &(0x7f0000000140)=0x8) 22:19:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "1000"}, 0x28) 22:19:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x4000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:19:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4c) [ 2426.466632][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40082406, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x68) 22:20:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x706) 22:20:00 executing program 4: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000001a40)={r1, r0, r1}, &(0x7f0000000280)=""/250, 0xfa, &(0x7f0000001a00)={&(0x7f0000000080)={'sha256-generic\x00'}}) keyctl$set_timeout(0xf, r0, 0x6) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='logon\x00', 0x0, &(0x7f0000000340)='\x00', 0x1, r2) 22:20:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "000300"}, 0x28) 22:20:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4008550d, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x6c) 22:20:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x5000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2426.837750][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:00 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = userfaultfd(0x800) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000780)={0x0, 0x0, 0xa, 0x0, [], [{0x1, 0x8, 0x2, 0x10001, 0x946f, 0xfffffffffffffffa}, {0xf411, 0x0, 0x3, 0x9, 0x800, 0x6bd5ab8f}], [[], [], [], [], [], [], [], [], [], []]}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, r5, 0x531, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x114c014}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0x1d0, r5, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x37}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x3}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x36}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2a}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x92f6296c0c336bc3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x68, 0x31}}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xd600}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x16}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x80}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x44}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x37}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7fffffff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xfffe}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x8001}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3ff}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x14054804}, 0x15) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000000)={0x7ff, 0x3, 0x4, 0x10, 0x81, {0x0, 0x2710}, {0x5, 0x1, 0xdf, 0x9, 0x3, 0x0, "7acb8da9"}, 0xffc00000, 0x4, @offset=0x3, 0x1, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_RESET(r6, 0x4141, 0x0) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:20:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x707) 22:20:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40086602, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x74) 22:20:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "000500"}, 0x28) 22:20:00 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x1}}, [0xfffffffffffffbff, 0x810f, 0xdce, 0x4, 0x12, 0xc0, 0x2, 0x401, 0x9, 0x100000000, 0x5, 0x6, 0x12c4, 0x7, 0x2]}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e20, 0x3ff, @remote, 0x2}}, 0xfffb, 0x9}, &(0x7f0000000240)=0x90) r3 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0xc000) add_key(&(0x7f0000000200)='asymmetric\x00', 0x0, &(0x7f0000000300)="6223bb", 0xfffffffffffffd3f, r3) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) accept(r4, &(0x7f0000000000)=@l2tp={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0xffffffffffffff52) 22:20:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x708) [ 2427.246997][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4008700c, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x6000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x7a) 22:20:00 executing program 4: request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='syz', 0xfffffffffffffff9) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:20:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "000600"}, 0x28) 22:20:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x300) [ 2427.607960][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4008700e, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x70a) 22:20:01 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10000, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000080}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x2, 0x6, 0x4, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x1}, [@IPSET_ATTR_FAMILY={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24001}, 0x20000000) 22:20:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x7000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x500) 22:20:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\a\x00'}, 0x28) 22:20:01 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="622dc7078c99672906af0aef2f8c16105e8d27f2b3d91f0766c18165db25b03a5365f31d5a68f312392b63f71cbe63e4ab04d3d64dbeaf4d0217b906244c071d589822bcb8c779d284a8e6720c5edb425dc8afd8e8b91ab923def99d8f988c99b43bdf2b6f7e9286643e80ce0b6f69f7c508374d95e1c808b937650c6c1efa987b314c8878eba6efc9eafed911b261077c5c11032e5a790f3096a360b77c1857f40328af9b656a844e02269c8c9771", 0xaf, r0) 22:20:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40087703, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x712) 22:20:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x600) 22:20:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x8000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:01 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xac400, 0x0) setsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000140), 0x4) getdents64(r1, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000000)={0x4, 0x9, 0x4, 0x1000, 0x8, {0x0, 0x7530}, {0x4, 0x7, 0x5, 0x20, 0x99, 0x8, "1d9bf797"}, 0x7fffffff, 0x0, @offset=0xa7, 0x2, 0x0, 0xffffffffffffffff}) write$P9_RLOCK(r3, &(0x7f0000000080)={0x8, 0x35, 0x1, 0x2}, 0x8) 22:20:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:20:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\f\x00'}, 0x28) 22:20:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x72d) 22:20:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40106410, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:01 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='blacklist\x00', 0x0, &(0x7f0000000080)="040699ce6dc62275db3584304f31fb144b6ad76410d440162fff09e71b", 0xfffffffffffffeda, 0xffffffffffffffff) socket$phonet(0x23, 0x2, 0x1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000040)={'veth1_to_hsr\x00', @ifru_hwaddr=@broadcast}) 22:20:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xa00) 22:20:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00?\x00'}, 0x28) 22:20:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0xb000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4010641a, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:02 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000000)="0043b634eba34fb188e5a690221ea40a74d79df8e1967c833bf0dfa03f9825b2da4d0c8d9d39a57030416d0cb2832981dc874919001dbe64313fe3d59be8089f6d4848ef398c47296598428886ddb60cfcb602881dff6ad07352c589fcd54e1fc4c006f0765375cf99138e2f5fde3891b1e0686a5e4deaf3528d4b4ceb9bd94c", 0x80, r0) 22:20:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x1200) 22:20:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x748) 22:20:02 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x1, 0x800080) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000040)={0x6, 0x3, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000080)={0x1, 0x0, 0x3}) socket$nl_netfilter(0x10, 0x3, 0xc) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, 0x0) 22:20:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x2d00) 22:20:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40186366, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00@\x00'}, 0x28) 22:20:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x74c) 22:20:02 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f00000000c0)="643752fd08ef71f703f9834eeeba2584d7fc433db5f3e0048e14a5a43ea3d2da1b5e0b78876d66a2479196c98c08228ff8ec9a6116d6afe21df8c9b37e5795358d3e9748314f008f10b037a1a9adb5a8e9", 0x51, r0) lookup_dcookie(0x2, &(0x7f0000000080)=""/51, 0xfffffc6d) 22:20:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4000) [ 2429.157562][ C1] net_ratelimit: 3 callbacks suppressed [ 2429.157573][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x3b000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:02 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x8, 0xa, 0x4, 0x40000000, 0x7, {}, {0x3, 0x2, 0x2, 0x8, 0xa4, 0x4, "0bbab286"}, 0x9, 0x1, @planes=&(0x7f0000000000)={0xfffffffb, 0x10001, @mem_offset=0x2, 0x5}, 0xdd10, 0x0, 0xffffffffffffffff}) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="aa7485ce5769fa05"], &(0x7f0000000140), 0x1000) 22:20:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000100"}, 0x28) 22:20:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x768) 22:20:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4800) 22:20:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4020940d, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2429.454210][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:03 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000001a40)={r3, r2, r3}, &(0x7f0000000280)=""/250, 0xfa, &(0x7f0000001a00)={&(0x7f0000000080)={'sha256-generic\x00'}}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000080)={r3, 0xe9, 0x1000}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'rmd128\x00'}}, &(0x7f0000000140)="c0cf5558e017109ab7e9d233681840c7d196e372bcd65ac435f3065a9d746d9d2c4cb3f31de9ba9903382b5c9df6cd2c75e2df3770792427ab604ead20b82bd81fdfcf2c670232edc84777650c88decf02aca00fb0f61130bbf20973269f780fc063ce919830bc5cbd11d3666e7d6da999daf9a59f7ef528016d0752d092678ddc2fb277c614aaaee3fbd3f4abbb53bbf49b00d4f2bfe77397bdf68499ae7b6b70d7c3556fddead351d62407cd31d35eaf5a7e49f690a7adbf5e7ba63a6638676b3cba334b96fe983208d96cacc54d6cbfebc48c5086d7484fc9853a7760a0a5e8820428cc537d5f71", &(0x7f0000000400)="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") getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @empty}, 0x5, 0x0, 0x0, 0x1, 0x240, 0x8}, &(0x7f0000000040)=0x20) 22:20:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000200"}, 0x28) 22:20:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4c00) 22:20:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x3f000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2429.787139][T23889] could not allocate digest TFM handle ƒÌ7é [ 2429.823683][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x76a) 22:20:03 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='pkcs7_test\x00', 0x0, &(0x7f0000000040)="7f8814883d1fab4e7eff40b513cdd3d8f348570532bfa8af4989145f25ff83d0f79f90a5d829563b1b4c5ff8dec66d8d3f5291353103e48f8637ee975a1c71f70edd06ba7a3147c00a0d13bbef18617f63446b92b1b98fdee3e0d103e58343ef601ec9578dec7c02583d61b28f0103226424cabd9259e988f03ffda7870977df65b34dd2f0c85ad06d2888448d2c4d6430865a3f6188dbf59bd0840cabfb6ab88e2500069d0abd7800537bf69086f7bdaae6bd60dcc658be96b90f033037b49113fb3cfd", 0xffffff18, r0) 22:20:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x6800) 22:20:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4024700a, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000300"}, 0x28) 22:20:03 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000000)="04", 0x1, r0) 22:20:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x6c00) 22:20:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x40000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x76c) 22:20:03 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xb1d0b914245b8f46, 0x0) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000300)) recvfrom$inet6(r1, &(0x7f0000000140)=""/228, 0xe4, 0xa180, &(0x7f0000000240)={0xa, 0x4e20, 0x8, @local, 0x9205}, 0x1c) sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_MGMT_A_DOMAIN={0x17, 0x1, 'posix_acl_access:-\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x17}}]}, 0x34}, 0x1, 0x0, 0x0, 0x92}, 0x1) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) [ 2430.341893][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x7400) 22:20:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000400"}, 0x28) 22:20:04 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) r2 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='keyring\x00', r1) keyctl$clear(0x7, r2) 22:20:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x7a00) 22:20:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x774) 22:20:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x800454d2, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0xfdfdffff, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2430.859200][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:04 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f00000005c0)=0x1) clone3(&(0x7f0000000480)={0xca81000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0, {0x1}, &(0x7f00000001c0)=""/96, 0x60, &(0x7f0000000400)=""/92, &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x3}, 0x50) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)={0x9c, 0xb, 0x0, 0x8cbd7ecdf4a3d538, 0x70bd2a, 0x25dfdbfb, {0x3, 0x0, 0x5}, [@nested={0x2c, 0x58, 0x0, 0x1, [@generic="bcd8c7cb857ffc0d61e069049ae17f21", @typed={0x8, 0x47, 0x0, 0x0, @uid=r1}, @typed={0x8, 0x80, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x7a, 0x0, 0x0, @fd=r2}]}, @typed={0x8, 0x59, 0x0, 0x0, @pid=r4}, @nested={0x54, 0x54, 0x0, 0x1, [@generic="0d41756ac6e28c5cf33239ef65a5b77d43a8592ab64b8543213604a3e6b65b50a882ce734eedf86a764ea1ad88588b9f00b21e093f5b97665d58904e13", @generic="67a065d6a46a72fb8004b00cb1eb04ae9905e1"]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40000}, 0x40044010) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x176, r0) 22:20:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x80086301, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000500"}, 0x28) 22:20:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x100000) 22:20:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x77a) 22:20:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0xff000000, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2431.262822][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x1000000) 22:20:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xa00) 22:20:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x8008700b, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:05 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x120) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, 0xffffffffffffffff) write$sndseq(r1, &(0x7f0000000400)=[{0x3, 0x40, 0x7, 0x4, @time={0x9, 0xffff}, {0x9, 0xb0}, {0x7, 0xff}, @result={0x7fffffff, 0x7}}, {0x80, 0x0, 0x6, 0x7, @tick=0x2, {0x3, 0xff}, {0x2, 0x5}, @result={0x2}}, {0x81, 0x91, 0x5, 0x7, @time={0x8, 0x1f}, {0x2, 0x3}, {0x4}, @quote={{0xb3, 0x82}, 0x1, &(0x7f0000000040)={0xff, 0x20, 0x3f, 0x6d, @time={0x53c6, 0xe9}, {0x3f, 0x1f}, {0xc2, 0x40}, @control={0x1, 0x7, 0x3}}}}, {0x80, 0x0, 0x75, 0xff, @tick=0x7, {0x2, 0x20}, {0xc3, 0x4}, @note={0x7, 0x4, 0x20, 0x5f, 0xdf}}, {0xff, 0x8, 0x7b, 0x7, @tick=0x9, {0x2, 0xff}, {0x1, 0x2}, @ext={0x87, &(0x7f0000000080)="984ef5c0308186811251eb1862998cc18beefd9575ec18c818060a9003704c0be6525418cc98a202b7474ccd362eeaa61aa1d4e85b08dc9aba8c3efc9f3f93dfe75efc1480c7289928c9acf1f9942ebfa98b9e3bb3dbf53d2dcc4ccafd856985b31088e02c06797656c89c960b0bff52ffe83fef81525b8ccd99317c0dc7748497df854cc4263c"}}, {0x5, 0x4, 0x7, 0x1, @time={0xfff, 0x5}, {0xc5}, {0x6, 0xff}, @addr={0x7, 0x9}}, {0x5, 0xf9, 0x0, 0x0, @tick=0x7fff, {0x8, 0x3}, {0x3f, 0x6}, @ext={0x7c, &(0x7f0000000140)="083b44859e64e7dd265ffbcd610010118d6a0ba3c441fe734745b01392c81959daf5cea43b93e84bb90f51bf1fe88f7022a60070044aa735ee42ce4d5314e996dd484d43592c6cd72046e1777f70e2da29c69ee97ec0f2be5d073ad3606bf896fab9d27f0dd130ac8f5abb8d16a298495b2196311221be4ee46e4f3f"}}], 0xfffffffffffffe69) 22:20:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000600"}, 0x28) 22:20:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x2000000) 22:20:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0xfffffdfd, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2431.725021][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xd00) 22:20:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000080)={0x9, &(0x7f0000000000)=[{0xffff, 0x60, 0x9, 0xcb}, {0x3, 0x7, 0x6, 0x8}, {0x1d, 0x1, 0x0, 0x1}, {0x1ff, 0x9, 0x6, 0x1}, {0x0, 0xff, 0x0, 0x7de3}, {0x4, 0xff, 0x80, 0x200}, {0x1, 0x1f, 0x8, 0x2}, {0xbb, 0x8, 0xff, 0xc530}, {0x4, 0x5, 0x4, 0x1}]}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000100)={[{0x6, 0x2, 0x8, 0x20, 0x3f, 0x3, 0x6, 0x8, 0x6, 0x6, 0xe0, 0x1, 0xfffffffffffffd11}, {0x8, 0x6, 0x1, 0x4, 0x4, 0x1, 0x2, 0xff, 0x5, 0x0, 0x2, 0x7f}, {0x8, 0xff, 0x37, 0x81, 0x0, 0x66, 0x5, 0x81, 0x0, 0x20, 0x3f, 0x6, 0xffffffffffffffc1}], 0x180000}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = semget$private(0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000180)={0x8, 'vlan0\x00', {'veth1_to_team\x00'}, 0x4}) semctl$GETNCNT(r0, 0x4, 0xe, &(0x7f00000000c0)=""/25) 22:20:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x3000000) 22:20:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x80247008, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00\a\x00'}, 0x28) 22:20:05 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0x9f0000, 0x2da8, 0xc765, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9909ca, 0x0, [], @value64=0xfffffffffffffffd}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0x1c}}, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r3, 0x20, 0x70bd26, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x32}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x88d4}, 0x1) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:20:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4000000) 22:20:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x80247009, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x2}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x1200) [ 2432.138476][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/80, 0x50) getdents64(r0, &(0x7f0000000700)=""/66, 0x42) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x3, 'ip6_vti0\x00', {0xef}, 0x9}) getdents64(r0, 0x0, 0x0) mmap$usbmon(&(0x7f0000ff7000/0x6000)=nil, 0x6000, 0x0, 0x11, r0, 0x7) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) 22:20:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x5000000) 22:20:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x80287010, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00\b\x00'}, 0x28) 22:20:06 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='big_key\x00', 0x0, &(0x7f0000000140)="042c795bd330705ed5e4983b9d8b02ff27713ff2d2fb4a0c330a8a0034d7457999b57e4801624c5f3eb10710b859a2355e33135ff8f71d2e1592b037f8c75e8c8086f08372d3850500cb72", 0xfffffffffffffe15, r0) sched_yield() 22:20:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x9}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x2d00) 22:20:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x6000000) [ 2432.691194][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:06 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'hsr0\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4d, 0x280000, 0x3, 0xcd, 0x40, 0x30, 0x81, 0x7, 0x20, 0x3, [0x1, 0x1000, 0x8, 0x3, 0x7f, 0x0, 0x5], [0x8001]}}) 22:20:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0045006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x7000000) 22:20:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00\f\x00'}, 0x28) 22:20:06 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) 22:20:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x10}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4000) 22:20:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xa000000) [ 2433.148834][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:06 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={'vlan0\x00', {0x2, 0x4e21, @loopback}}) 22:20:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc004500a, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x12000000) 22:20:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000001000"}, 0x28) 22:20:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xab0f) 22:20:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:06 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) getpgrp(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, r1) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r4, 0x0, 0xffffffffffffffff, r3) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/connector\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) r6 = open_tree(r5, &(0x7f0000000000)='./file0\x00', 0x800) fstat(r6, &(0x7f0000000040)) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:20:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x2d000000) 22:20:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00?\x00'}, 0x28) 22:20:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xb50f) 22:20:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x40000000) 22:20:07 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) 22:20:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x2}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0045878, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x48000000) 22:20:07 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000040)={0x10000, 0xa000}) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) 22:20:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00@\x00'}, 0x28) 22:20:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0189436, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xbd0f) 22:20:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4c000000) 22:20:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x3}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2434.363298][ C1] net_ratelimit: 2 callbacks suppressed [ 2434.363309][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:08 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000000)="07963015299d3e04a16d5f1710c16343750a4e7bb14fddf6ad4103b6a6591f4bbd40964f53c45587839dcdd4f6352e9ae399078541b667d4a5f3c326edaf408aeebf2ddd13317244cb65fd94f22b18fd6de3564f6bb0755a708eaef46122cfa67d0a1e1b", 0x64, r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x1, 0x200) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000240)) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, r1) ptrace$peeksig(0x4209, r2, &(0x7f0000000080)={0x7, 0x1, 0x2}, &(0x7f00000000c0)=[{}, {}]) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r4, 0x10c, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r6, 0x0, 0xffffffffffffffff, r5) sched_setscheduler(r6, 0x3, &(0x7f00000001c0)=0x1000) 22:20:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x68000000) 22:20:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xbe0f) 22:20:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "ffffff8d00"}, 0x28) 22:20:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0485619, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:08 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x2, 0x2, 0x7f, 0x80, @time={0xaeea}, {0x6, 0x9}, {0x2, 0x7}, @raw32={[0x1, 0x2, 0x3]}}, {0x40, 0x7f, 0x5, 0x7, @time={0x8, 0xfffffff9}, {0x7, 0x1}, {0x7f, 0x6}, @quote={{0x5, 0x8}, 0x8, &(0x7f0000000000)={0x2, 0x7f, 0xd2, 0x7, @tick=0x1, {0x0, 0x8}, {0x6, 0x3f}, @control={0x3, 0x9, 0x200}}}}], 0x38) 22:20:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x4}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x6c000000) [ 2434.848568][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xc20f) 22:20:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:08 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='blacklist\x00', 0x0, &(0x7f0000000340)="04", 0xffffff15, r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) r4 = socket(0x11, 0x3, 0x0) accept4$netrom(r2, &(0x7f0000000480)={{0x3, @rose}, [@default, @remote, @bcast, @netrom, @bcast, @netrom, @bcast, @rose]}, &(0x7f0000000500)=0x48, 0x800) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r5, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0x6}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000200)={r7, 0x72e, 0x20}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={r8, 0x9, &(0x7f0000000340)}, &(0x7f0000000100)=0x2c9) r9 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000540), &(0x7f0000000300)=0x0, &(0x7f0000000380)) setregid(r11, r12) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}, 0x20) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000040)={r10, 0xa960, 0x1, 0x5}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r13, 0x7f}, 0x8) 22:20:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "fffffff000"}, 0x28) 22:20:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x74000000) 22:20:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0xc06864a2, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2435.267773][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xc50f) 22:20:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x5}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x7a000000) 22:20:08 executing program 4: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) request_key(&(0x7f0000000100)='logon\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='ppp1*eth1$\x00', r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f00000000c0)) 22:20:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "8dffffff00"}, 0x28) 22:20:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xfeffffff) 22:20:09 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000140)) setreuid(0x0, r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) mount$9p_virtio(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1080042, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=virtio,mmap,smackfsdef=keyring\x00,smackfsfloor=keyring\x00,uid=', @ANYRESDEC=r1, @ANYBLOB='k2']) 22:20:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x2, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xca0f) [ 2435.777092][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xfffffffe) 22:20:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x6}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:09 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x40}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @loopback}}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x1) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:20:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "f0ffffff00"}, 0x28) 22:20:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x3, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x10000000000000) 22:20:09 executing program 4: syz_init_net_socket$x25(0x9, 0x5, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) [ 2436.175301][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xd00f) 22:20:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x100000000000000) 22:20:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x4, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000000000001"}, 0x28) 22:20:09 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) add_key(&(0x7f0000000000)='keyring\x00', 0x0, &(0x7f0000000340)="04", 0xfffffffffffffcd8, r0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) 22:20:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x7}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2436.504717][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xd20f) 22:20:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x5, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:10 executing program 4: r0 = getpgrp(0xffffffffffffffff) ptrace$peek(0xffffffffffffffff, r0, &(0x7f0000000000)) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) 22:20:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x200000000000000) 22:20:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000000000002"}, 0x28) 22:20:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x8}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/80, 0x50) getdents64(r0, &(0x7f0000000700)=""/66, 0x42) getdents64(r0, 0x0, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000000)={0x2, @sdr={0x1a192c21, 0x3}}) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) 22:20:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x300000000000000) 22:20:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) fanotify_init(0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2436.949873][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x6, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:10 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 22:20:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000000000003"}, 0x28) 22:20:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x400000000000000) 22:20:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x7, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:10 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) getsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000040)=""/213, &(0x7f0000000140)=0xd5) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000200)={0xa, 0x3, 0x5, 0x7, '\x00', 0x20}) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvme-fabrics\x00', 0x2b0000, 0x0) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f00000001c0)={0xb, 0xfffffffb, 0x9}) 22:20:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0xb}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2437.371943][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) dup2(r0, r1) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x400040) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xfffffffffffff803) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:20:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000000000004"}, 0x28) 22:20:11 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='pkcs7_test\x00', 0x0, &(0x7f0000000040)="a579d70e13", 0x1, r0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x1, &(0x7f0000000080)=0x2) 22:20:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x500000000000000) 22:20:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x8, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2437.713981][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x3b}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x600000000000000) 22:20:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x1) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:20:11 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480)='/dev/bsg\x00', 0x1, 0x0) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f00000004c0)) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = userfaultfd(0x0) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xfffffffffffffff9, 0x98800) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xf0804ce90a763192}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)={0x70, 0x2, 0x6, 0x100, 0x70bd2b, 0x25dfdbfc, {0x3, 0x0, 0x2}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xff}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x1}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev={0xac, 0x14, 0x14, 0x23}}}]}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x70}, 0x1, 0x0, 0x0, 0x10000840}, 0x297ede84c1322a54) fgetxattr(r2, &(0x7f0000000000)=@random={'system.', 'syz'}, &(0x7f0000000040)=""/209, 0xd1) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) r4 = open(&(0x7f0000000140)='./file0\x00', 0x50100, 0x1) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x6}) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, r1) fchmod(r4, 0xdb) accept4$unix(r4, 0x0, &(0x7f0000000200)=0xffffffffffffff6b, 0x80000) 22:20:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000000000005"}, 0x28) 22:20:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2438.013292][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:11 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000000)=0x7, 0x4) 22:20:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700000000000000) 22:20:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000000000006"}, 0x28) 22:20:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x2, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x139001, 0x0) readlinkat(r5, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/106, 0x6a) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r6 = accept4$ax25(r2, &(0x7f0000000200)={{0x3, @rose}, [@bcast, @rose, @default, @bcast, @remote, @bcast, @rose, @netrom]}, &(0x7f0000000180)=0x48, 0x80000) ioctl$sock_ax25_SIOCADDRT(r6, 0x890b, &(0x7f0000000280)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) kcmp(0x0, r4, 0x0, 0xffffffffffffffff, r3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='stack\x00') preadv(r7, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:20:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x300}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xa00000000000000) [ 2438.504763][T30439] [ 2438.507273][T30439] ====================================================== [ 2438.514300][T30439] WARNING: possible circular locking dependency detected [ 2438.521328][T30439] 5.5.0-rc5-syzkaller #0 Not tainted [ 2438.526698][T30439] ------------------------------------------------------ [ 2438.533721][T30439] syz-executor.5/30439 is trying to acquire lock: [ 2438.540139][T30439] ffff88809769b0d0 (&sig->cred_guard_mutex){+.+.}, at: lock_trace+0x4a/0xe0 [ 2438.549036][T30439] 22:20:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x3, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00\x00\x00\x00\x00\a'}, 0x28) [ 2438.549036][T30439] but task is already holding lock: [ 2438.556396][T30439] ffff88808eae9f40 (&p->lock){+.+.}, at: seq_read+0x71/0x1170 [ 2438.563873][T30439] [ 2438.563873][T30439] which lock already depends on the new lock. [ 2438.563873][T30439] [ 2438.574292][T30439] [ 2438.574292][T30439] the existing dependency chain (in reverse order) is: [ 2438.583333][T30439] [ 2438.583333][T30439] -> #3 (&p->lock){+.+.}: [ 2438.589835][T30439] __mutex_lock+0x156/0x13c0 [ 2438.594944][T30439] mutex_lock_nested+0x16/0x20 [ 2438.600224][T30439] seq_read+0x71/0x1170 [ 2438.604908][T30439] do_iter_read+0x4a4/0x660 [ 2438.609933][T30439] vfs_readv+0xf0/0x160 [ 2438.614684][T30439] default_file_splice_read+0x4fb/0xa20 [ 2438.620736][T30439] do_splice_to+0x127/0x180 [ 2438.625857][T30439] splice_direct_to_actor+0x320/0xa30 [ 2438.631745][T30439] do_splice_direct+0x1da/0x2a0 [ 2438.637250][T30439] do_sendfile+0x597/0xd00 [ 2438.642190][T30439] __x64_sys_sendfile64+0x1dd/0x220 [ 2438.647915][T30439] do_syscall_64+0xfa/0x790 [ 2438.652926][T30439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.659422][T30439] [ 2438.659422][T30439] -> #2 (sb_writers#3){.+.+}: [ 2438.666300][T30439] __sb_start_write+0x241/0x460 [ 2438.671660][T30439] mnt_want_write+0x3f/0xc0 [ 2438.676761][T30439] ovl_want_write+0x76/0xa0 [ 2438.681817][T30439] ovl_setattr+0xdd/0x8b0 [ 2438.686664][T30439] notify_change+0xad7/0xfb0 [ 2438.691766][T30439] chown_common+0x50c/0x5c0 [ 2438.696945][T30439] do_fchownat+0x143/0x200 [ 2438.701870][T30439] __x64_sys_chown+0x7b/0xc0 [ 2438.706964][T30439] do_syscall_64+0xfa/0x790 [ 2438.711973][T30439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.718376][T30439] [ 2438.718376][T30439] -> #1 (&ovl_i_mutex_dir_key[depth]){++++}: [ 2438.726516][T30439] down_read+0x95/0x430 [ 2438.731177][T30439] path_openat+0x1e37/0x4500 [ 2438.736271][T30439] do_filp_open+0x1a1/0x280 [ 2438.741299][T30439] do_open_execat+0x137/0x690 [ 2438.746581][T30439] __do_execve_file.isra.0+0x1702/0x22b0 [ 2438.752852][T30439] __x64_sys_execve+0x8f/0xc0 [ 2438.758051][T30439] do_syscall_64+0xfa/0x790 [ 2438.763066][T30439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.769456][T30439] [ 2438.769456][T30439] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 2438.777323][T30439] __lock_acquire+0x2596/0x4a00 [ 2438.782685][T30439] lock_acquire+0x190/0x410 [ 2438.787699][T30439] __mutex_lock+0x156/0x13c0 [ 2438.792796][T30439] mutex_lock_killable_nested+0x16/0x20 [ 2438.798847][T30439] lock_trace+0x4a/0xe0 [ 2438.803524][T30439] proc_pid_stack+0xbf/0x200 [ 2438.808644][T30439] proc_single_show+0xfd/0x1c0 [ 2438.813929][T30439] traverse+0x1cd/0x730 [ 2438.818593][T30439] seq_read+0x906/0x1170 [ 2438.823342][T30439] do_iter_read+0x4a4/0x660 [ 2438.828353][T30439] vfs_readv+0xf0/0x160 [ 2438.833534][T30439] do_preadv+0x1c4/0x280 [ 2438.838295][T30439] __x64_sys_preadv+0x9a/0xf0 [ 2438.843506][T30439] do_syscall_64+0xfa/0x790 [ 2438.848514][T30439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.854902][T30439] [ 2438.854902][T30439] other info that might help us debug this: [ 2438.854902][T30439] [ 2438.865109][T30439] Chain exists of: [ 2438.865109][T30439] &sig->cred_guard_mutex --> sb_writers#3 --> &p->lock [ 2438.865109][T30439] [ 2438.877867][T30439] Possible unsafe locking scenario: [ 2438.877867][T30439] [ 2438.885298][T30439] CPU0 CPU1 [ 2438.890647][T30439] ---- ---- [ 2438.896005][T30439] lock(&p->lock); [ 2438.899803][T30439] lock(sb_writers#3); [ 2438.906453][T30439] lock(&p->lock); [ 2438.912760][T30439] lock(&sig->cred_guard_mutex); [ 2438.917782][T30439] [ 2438.917782][T30439] *** DEADLOCK *** [ 2438.917782][T30439] [ 2438.925931][T30439] 1 lock held by syz-executor.5/30439: [ 2438.931370][T30439] #0: ffff88808eae9f40 (&p->lock){+.+.}, at: seq_read+0x71/0x1170 [ 2438.939293][T30439] [ 2438.939293][T30439] stack backtrace: [ 2438.945202][T30439] CPU: 1 PID: 30439 Comm: syz-executor.5 Not tainted 5.5.0-rc5-syzkaller #0 [ 2438.953883][T30439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2438.963934][T30439] Call Trace: [ 2438.967249][T30439] dump_stack+0x197/0x210 [ 2438.971583][T30439] print_circular_bug.isra.0.cold+0x163/0x172 [ 2438.977650][T30439] check_noncircular+0x32e/0x3e0 [ 2438.982575][T30439] ? print_circular_bug.isra.0+0x230/0x230 [ 2438.988365][T30439] ? alloc_list_entry+0xc0/0xc0 [ 2438.993217][T30439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2438.999443][T30439] ? find_first_zero_bit+0x9a/0xc0 [ 2439.004539][T30439] __lock_acquire+0x2596/0x4a00 [ 2439.009387][T30439] ? mark_held_locks+0xf0/0xf0 [ 2439.014223][T30439] lock_acquire+0x190/0x410 [ 2439.018707][T30439] ? lock_trace+0x4a/0xe0 [ 2439.023037][T30439] __mutex_lock+0x156/0x13c0 [ 2439.027610][T30439] ? lock_trace+0x4a/0xe0 [ 2439.031922][T30439] ? lock_trace+0x4a/0xe0 [ 2439.036236][T30439] ? __kasan_check_read+0x11/0x20 [ 2439.041247][T30439] ? mutex_trylock+0x2d0/0x2d0 [ 2439.045996][T30439] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2439.052134][T30439] ? proc_pid_stack+0xa4/0x200 [ 2439.056903][T30439] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2439.062476][T30439] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2439.068461][T30439] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2439.074274][T30439] mutex_lock_killable_nested+0x16/0x20 [ 2439.079837][T30439] ? mutex_lock_killable_nested+0x16/0x20 [ 2439.085587][T30439] lock_trace+0x4a/0xe0 [ 2439.089740][T30439] proc_pid_stack+0xbf/0x200 [ 2439.094345][T30439] proc_single_show+0xfd/0x1c0 [ 2439.099096][T30439] traverse+0x1cd/0x730 [ 2439.103253][T30439] seq_read+0x906/0x1170 [ 2439.107483][T30439] ? rw_verify_area+0x126/0x360 [ 2439.112324][T30439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2439.118549][T30439] do_iter_read+0x4a4/0x660 [ 2439.123063][T30439] ? dup_iter+0x260/0x260 [ 2439.127375][T30439] vfs_readv+0xf0/0x160 [ 2439.131530][T30439] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 2439.137579][T30439] ? __kasan_check_read+0x11/0x20 [ 2439.142592][T30439] ? ksys_dup3+0x3e0/0x3e0 [ 2439.146995][T30439] ? __kasan_check_read+0x11/0x20 [ 2439.152014][T30439] ? _copy_to_user+0x118/0x160 [ 2439.156760][T30439] ? __fget_light+0x1a9/0x230 [ 2439.161423][T30439] do_preadv+0x1c4/0x280 [ 2439.165652][T30439] ? do_readv+0x330/0x330 [ 2439.169980][T30439] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2439.175428][T30439] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2439.180879][T30439] ? do_syscall_64+0x26/0x790 [ 2439.185541][T30439] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2439.191590][T30439] ? do_syscall_64+0x26/0x790 [ 2439.196340][T30439] __x64_sys_preadv+0x9a/0xf0 [ 2439.201009][T30439] do_syscall_64+0xfa/0x790 [ 2439.206710][T30439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2439.212583][T30439] RIP: 0033:0x45af49 [ 2439.216465][T30439] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2439.236049][T30439] RSP: 002b:00007f0777d7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 2439.244443][T30439] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045af49 22:20:12 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x684200, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000040)=0x19) [ 2439.252398][T30439] RDX: 0000000000000001 RSI: 0000000020000940 RDI: 0000000000000007 [ 2439.260348][T30439] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2439.268299][T30439] R10: 0000000000000700 R11: 0000000000000246 R12: 00007f0777d7c6d4 [ 2439.276273][T30439] R13: 00000000004c952c R14: 00000000004e1f70 R15: 00000000ffffffff [ 2439.301304][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env 22:20:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x500}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2439.320665][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000240)={0x1, 0x1ff, 0x100, 0x4, 0x96, "92b8353d94a7338c2b80fac9c5a48cc3341cde", 0x3, 0x2}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x2d2680, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r4, 0x300, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x9}]}, 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') open(&(0x7f0000000000)='./file0\x00', 0x2, 0x20) ioctl$NBD_SET_SIZE_BLOCKS(r5, 0xab07, 0x3) preadv(r5, &(0x7f0000000940), 0x0, 0x700) [ 2439.376897][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env 22:20:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x1200000000000000) 22:20:12 executing program 4: r0 = accept4$rose(0xffffffffffffffff, &(0x7f0000001540)=@short={0xb, @remote, @rose, 0x1, @rose}, &(0x7f0000001580)=0x1c, 0x80800) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000015c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2e, @default, @bpq0='bpq0\x00', 0x2, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x401, 0x88080) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000001500)={0x28, 0x2, 0x0, {0x4, 0x1f, 0x4}}, 0x28) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r1) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="61c2adb55653d5e6683a0aa318d3682eb96e1c88609a195690d79406271dbace97c6c2b52826a00e1fc31c0138d48c8c76de2673f443df5ff6a6d93ab4c61d8a7e373080b13c54b3c25d74541105bba2e11fe87d4ae1aedb8ea0a22ebf09a56fc1fc453a0800e8afd2ae24db85d1baef34f276d470ab9e1190a848afea03e88659fea199bea54c4b7e38878166ac68d675efbd26ce9b015bf296b7ff9fb02e28c935625788", 0xa5, r1) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x227, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)="01", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000001a40)={r5, r4, r5}, &(0x7f0000000280)=""/250, 0xfa, &(0x7f0000001a00)={&(0x7f0000000080)={'sha256-generic\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r3, r5}, &(0x7f0000000400)=""/4096, 0x1000, &(0x7f00000001c0)={&(0x7f0000000180)={'michael_mic-generic\x00'}, &(0x7f0000001400)="d6d0049438cda6b5bea084ca98bd1d10c45c2ec03e58d89690db0f3ca471680abdcdb109caea7e0c1aa6d6eb4e314a3dacf523ce374e4343fa71cb1c7d75ac9e18a5ebf01a65ed1ddfd0218b401920d740232f6cd88e5ae74f1383f3f4f8be565bbaecea3fb3b3a3665db149534ba1eaaec2c24407dd4d7efb3d06ba9022d1ee208ae27d0b7dd58d481eb5ed8dcc64c9cfc91f812152329a4f7618e5b14e828538e0ceef0f22b159c6ada434033cb9221978ae01f9d6da8e0469c7d996307c243cdc", 0xc2}) 22:20:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00\x00\x00\x00\x00\b'}, 0x28) [ 2439.433113][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2439.488303][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2439.497158][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:20:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x4, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x2d00000000000000) [ 2439.562187][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2439.586820][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2439.605001][ C1] net_ratelimit: 2 callbacks suppressed 22:20:13 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101801, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f0000000100)=0x5, 0x4) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:20:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x600}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2439.605011][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2439.635911][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env 22:20:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x44, 0xf3a97d9a2a5e39bd) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r4 = socket(0x11, 0x3, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r5, 0x40045730, &(0x7f00000000c0)=0x20000000) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000040)=0x5bff, 0x8) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r6, &(0x7f0000000140), 0x100000000000022e, 0x2700) [ 2439.676332][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:13 executing program 4: syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:20:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00\x00\x00\x00\x00\f'}, 0x28) 22:20:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4000000000000000) [ 2439.725551][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2439.747851][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x5, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2439.807661][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2439.835834][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:13 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/xfrm_stat\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) getdents64(r1, &(0x7f0000000700)=""/52, 0xffffffffffffff7e) getdents64(r1, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r1, 0xc1004110, &(0x7f0000000080)={0x1ff, [0x0, 0x1, 0x5], [{0x8, 0x1, 0x0, 0x0, 0x0, 0x1}, {0x6, 0x44f, 0x1, 0x1, 0x0, 0x1}, {0x8, 0x7ff, 0x1, 0x0, 0x1, 0x1}, {0x2, 0x9, 0x0, 0x1, 0x1}, {0x7, 0x1ff, 0x0, 0x1, 0x1, 0x1}, {0xcedb6f2, 0x8, 0x0, 0x0, 0x1, 0x1}, {0xfffffffb, 0x1, 0x1, 0x1, 0x1}, {0x0, 0x7ff, 0x0, 0x1}, {}, {0x100, 0x7, 0x1, 0x1}, {0x3, 0x4, 0x0, 0x0, 0x0, 0x1}, {0x8001, 0x0, 0x1}], 0x9}) add_key(&(0x7f0000000000)='.request_key_auth\x00', 0x0, &(0x7f0000000040)="0443dd7134f85632f05c96abc13598f687b223", 0xff, r0) [ 2439.853881][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x700}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000000000010"}, 0x28) [ 2439.913877][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env 22:20:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4800000000000000) [ 2439.955791][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:13 executing program 4: add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, &(0x7f0000000000)="29a7a641fcefe9b50027ec221b0faf8e0309b9053f93b408fe35613e727cc92893bcb05b17cb96650bffb4a427ef473c95a9aab912f6f9056b9ee18f17d3495347e113b108975dac0250d7c5c4521851761a331fd6d42c9df15064c8664df2afdc88bc1db32e12dbf1e4c3d1a3bf59fb374e01aface4ab426d855b5842dacd843a935166958363ad3ba6869efa5a84125cd20aefb14995e698045ff15e89a1b779aa2e8acfe0d825e65cb2bffff8d78b1bccaa5c8686d630e7be109da922aa0cb13c7cd640f8f6f366a7b491b3a61424dcbb901e35878f1bed200890e81d3ebb", 0xe0, 0xc23d8c9f75a532de, 0x0, 0x0) 22:20:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x60, 0x101000) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f0000000200)) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r4, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) setsockopt$RXRPC_SECURITY_KEY(r3, 0x110, 0x1, &(0x7f0000000240)='\x00', 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') setsockopt$inet_mreqsrc(r6, 0x0, 0x28, &(0x7f0000000280)={@remote, @broadcast, @empty}, 0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x5}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000340)={r7, 0x1ff}, &(0x7f0000000380)=0x8) getdents64(r6, &(0x7f0000000080)=""/80, 0x50) getdents64(r6, &(0x7f0000000700)=""/66, 0x42) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nvram\x00', 0x200000, 0x0) getdents64(r8, &(0x7f0000000480)=""/181, 0xb5) getdents64(r6, 0x0, 0x0) ioctl$KDGKBDIACR(r6, 0x4b4a, &(0x7f0000000100)=""/184) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0x483, &(0x7f0000000000), &(0x7f00000000c0)=0x68) r9 = openat(r4, &(0x7f00000003c0)='./file0\x00', 0x801, 0x80) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r9, 0x80045300, &(0x7f0000000400)) 22:20:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x4c00000000000000) [ 2440.052973][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env 22:20:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x6, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2440.095974][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2440.099387][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:13 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='keyring\x00', 0x0, &(0x7f0000000340)="04", 0x1, r0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) r3 = dup2(0xffffffffffffffff, r2) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)=0x80, 0x4) ioctl$KVM_GET_SUPPORTED_CPUID(r3, 0xc008ae05, &(0x7f0000000080)=""/24) bind$bt_hci(r3, &(0x7f0000000100)={0x1f, 0x9}, 0x270) [ 2440.155609][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env 22:20:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0xb00}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00\x00\x00\x00\x00?'}, 0x28) 22:20:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x6800000000000000) [ 2440.217320][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2440.255708][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env 22:20:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2440.293346][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2440.330893][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:13 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) r3 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000100)=0x10) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000180)={0x800, 0x1, 0x3, 0x10001, 0x6d6}) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f0000000040)=0x75d, 0x4) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x20002, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, &(0x7f0000000240)=0xfffffffc) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:20:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x7, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2440.349365][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2440.374593][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\x00\x00\x00\x00\x00@'}, 0x28) 22:20:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x6c00000000000000) [ 2440.452958][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2440.460156][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:20:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') 22:20:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x8, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x3b00}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:14 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r5, 0x10, &(0x7f0000000580)={0x0, 0x0}) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r7, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYPTR64=&(0x7f0000000900)=ANY=[@ANYBLOB="93cf049886d0216d903e9da173b467d41f8846b08519c9e81446e2148a5eda0b95bdde1276597ecd3d787688b1359a9ec33a83a22e6077321efd1e4f8af6606e358464b9c0c88ceed9b1a6e056b18652efb9681f6d4a81d0024bc49ac5b97f8bbd3924a402f81e3ca9f2ab6febd56f12e7db520a3b4ffcafaeecae29e88124b11b61c3f91f1d608629376b578b6727f2aa773fe6345611", @ANYRES16, @ANYRESHEX, @ANYRES16], @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRESHEX=r3], 0x6, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x1, &(0x7f0000000080)='\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x0, 0x0, r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/autofs\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r3, r2, 0x0, 0x14, &(0x7f0000000180)='&$vboxnet1security!\x00', r8}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0x8, &(0x7f0000000100)='keyring\x00', r8}, 0x30) r9 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r9, &(0x7f0000000080)=""/80, 0x50) getdents64(r9, &(0x7f0000000700)=""/66, 0x42) getdents64(r9, 0x0, 0x0) ioctl$PIO_SCRNMAP(r9, 0x4b41, &(0x7f0000000000)="d27817128a8dd58319823f83dee0ad90ae754a") add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) [ 2440.534370][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2440.558797][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2440.572959][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x7400000000000000) 22:20:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "0000000000000080"}, 0x28) [ 2440.625394][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2440.658684][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) fanotify_init(0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200f40, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) r4 = dup2(r1, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='net/icmp6\x00') preadv(r5, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:20:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2440.731910][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2440.739109][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x7a00000000000000) [ 2440.800620][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2440.815328][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2440.840702][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x3f00}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2440.857603][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2440.867448][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2440.887030][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2440.903051][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$SNDRV_PCM_IOCTL_DROP(0xffffffffffffffff, 0x4143, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000000)={0x0, 'vxcan1\x00', {0x3}, 0x4}) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r4, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(r3, 0x1, 0x3d, &(0x7f0000000200)=""/2, &(0x7f0000000240)=0x2) r7 = syz_open_procfs(r6, &(0x7f0000000100)='net/snmp\x00') r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r7, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x82000204}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x128, r8, 0x404, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfce}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x4}, 0x2040050) 22:20:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "00000000ffffff8d"}, 0x28) 22:20:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xfeffffff00000000) [ 2440.936236][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2440.971667][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2440.991946][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2441.001155][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:14 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000000)="02", 0x3c, r0) 22:20:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x2, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2441.042306][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2441.052933][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2441.066727][T32539] kobject: 'vxcan1.3' (00000000f9ab2408): kobject_add_internal: parent: 'net', set: 'devices' [ 2441.074709][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2441.107316][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2441.107838][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2441.143459][T32539] kobject: 'vxcan1.3' (00000000f9ab2408): kobject_uevent_env 22:20:14 executing program 2: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x20a154cc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000003100)='/dev/vsock\x00', 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000003140)) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x80, &(0x7f0000000040), 0x4) r7 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xab9681224e077381) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)={0x1, 0xd27f, 0x1, 0x0, 0x0, [{{r7}, 0x1800000000000000}]}) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f00000000c0)={r6, 0x4f, 0x3ff, "a67b53a080d5c72c775575a402d20fab566bc05d7317c130b1c13b15b34a77fd9a2c889df2d7e788dccb669abd8c1915a82781cb6d532e9e8123b25923beefc2520f443f328e537648705b2a102aa3aba086"}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)={0x15c, 0x40, 0x400, 0x70bd23, 0x25dfdbff, {0xd}, [@generic="c0e499323e87460309131fa8374cefd25da25a740c8af5cb8dba4afc63423efed755739652f09a1685f5ca92d881158ba217e80ab3991d5b82ce7dcf6c32c3c57e3b7dece24abb32847f984e6d6f51e8c8a516af2e4ba231d61e500a4bcf82fc24a9", @generic="ebed64c83d2f2dc8c113fef3557178d2d922bd38da3e169642f7ebfc9655eccc624d76bfdac8f47e102a201c1d6dd65a2f1e41060472167ffbe2fc3d8bbb69761e8a57a04eab3d12a6dae97aca9a8f7c75e88685f4f37ee9daeef48c3eaf5b0e7adff30f97d7e9c3c8b666a0b3dcc6d2724a1f971b31330d26cdb0737f70da4836b894c40dc8091f0e5184e6cb72ff546064cccd8821712bbdab43028a2747b6dd1813a549fcc9575237b3f7fdf7027c34ceb40cd57bc11bc49fcb64339b4ccf0af7f6e5ade206ac811a4b8c474e9e4e1994a73d6ae59bf4f0458c1a5717cb41f8829d80", @generic]}, 0x15c}, 0x1, 0x0, 0x0, 0x54}, 0x40) [ 2441.151810][T32539] kobject: 'vxcan1.3' (00000000f9ab2408): fill_kobj_path: path = '/devices/virtual/net/vxcan1.3' [ 2441.184164][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env 22:20:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "00000000fffffff0"}, 0x28) [ 2441.206730][T32539] kobject: 'queues' (000000009f9c37a0): kobject_add_internal: parent: 'vxcan1.3', set: '' [ 2441.217483][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2441.229589][T32539] kobject: 'queues' (000000009f9c37a0): kobject_uevent_env [ 2441.248078][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2441.255434][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2441.268449][T32539] kobject: 'queues' (000000009f9c37a0): kobject_uevent_env: filter function caused the event to drop! [ 2441.289209][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env 22:20:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x3, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:14 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) sendmsg$NFNL_MSG_CTHELPER_DEL(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xc8, 0x2, 0x9, 0xa0f07d61129f2b70, 0x70bd2d, 0x25dfdbfb, {0xc, 0x0, 0x6}, [@NFCTH_POLICY={0xc, 0x4, {0x8, 0x5, 0x80}}, @NFCTH_TUPLE={0x78, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0xab}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x8735bd49f779cf2}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0xa5}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x6}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x5}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x8}]}, 0xc8}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2441.304722][T32539] kobject: 'rx-0' (000000000142e67f): kobject_add_internal: parent: 'queues', set: 'queues' [ 2441.328582][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2441.348077][T32539] kobject: 'rx-0' (000000000142e67f): kobject_uevent_env 22:20:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x4000}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2441.366522][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2441.381226][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2441.388574][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2441.402988][T32539] kobject: 'rx-0' (000000000142e67f): fill_kobj_path: path = '/devices/virtual/net/vxcan1.3/queues/rx-0' 22:20:15 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x1) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000040)={0x800100a, 0x9, 0x2}) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 22:20:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x4, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2441.551169][T32539] kobject: 'tx-0' (00000000c461d6ef): kobject_add_internal: parent: 'queues', set: 'queues' [ 2441.625640][T32539] kobject: 'tx-0' (00000000c461d6ef): kobject_uevent_env [ 2441.647627][T32539] kobject: 'tx-0' (00000000c461d6ef): fill_kobj_path: path = '/devices/virtual/net/vxcan1.3/queues/tx-0' [ 2441.699005][T32539] kobject: 'batman_adv' (00000000d055e199): kobject_add_internal: parent: 'vxcan1.3', set: '' [ 2441.745368][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2441.773528][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:20:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0xff00}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "000200"}, 0x28) 22:20:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r1, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x6}, @NL80211_ATTR_STA_WME={0x34, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x3f}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0xec}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x7f}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x41}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x1}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x4}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x712, 0x2}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:20:15 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000040)={{0xfa, 0x60}, 'port1\x00', 0x24, 0x1, 0x9, 0xfffffffc, 0x6, 0x7, 0xfffffff9, 0x0, 0x6, 0x5}) 22:20:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x3) preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0x4) getsockopt$IP_SET_OP_VERSION(r5, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000100)=0x8) [ 2441.827303][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2441.859703][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2441.885113][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2441.910298][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env 22:20:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x5, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:15 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000000)={{0xfc, 0x9}, 'port1\x00', 0x15, 0x1000, 0x1, 0x1f, 0x80000000, 0x7, 0x4, 0x0, 0x4, 0x9}) [ 2441.963053][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:15 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000080)=""/80, 0x50) getdents64(r0, &(0x7f0000000700)=""/66, 0x42) getdents64(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000000)='\x00', 0x0, 0xffffffffffffffff) 22:20:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "000300"}, 0x28) [ 2442.036662][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env 22:20:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x1000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:15 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000000), 0x4) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0xf8ff8e5bc4dcd10f, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000140)='\x06\x00\x00\xf6\xb6p\xf9O\x02/i>oPM\xed7\xbd\xef\xce\x88\x7f\x8a\x1c\x99\xd9\xf80\xad\xb4R@7\x1b\xcc\xba\xeb\xf0\xa3\xc9\xd7\b\xab\xe4\xad\xfb\xb4\xd54#\xb6d+u\xb3\xb3%\xee\xfaE\x1a\xe4a(\x9c\x02B\xf5\xbd]\xc0\xe7\x7f\xe1\xdf~\xa2F2R-\x9a\xb31.\xe9\xa9q0\xf5\xd7\r+K\xcb\xb99\xb8E\xdf\x1ch3se\xf0\xab\'\xd0@\xcf\x86\xad\x0eL%E\xc8y\x9d>\xf0\xa8\xabw\xa1\xa5\x12\xe5L\xd1e8L}\xac}\xa4\xb0bul!\xd5\xcf\xea\x11\xc4H3`3\xb5\xd3\x00\xa4\x16\'\x00\n\x14v\x9f\xbc\xb5\x13/\x0fUv\b\xfep\x8bY\xeb\"\xd9\xca&C\x1b\xc4\x8agG\xc6\x90N\x00\x00\x00\x009\a7e\xc1D\xa1%`c\x92N\x10\xe7\xf1\x91\xb1+\x00\x9af\xdcZ\xb7\xb9O\xd5n\x04\f\xf0\xf5\xe5\xe7\xff\x9b\xae\xf2\xf1\x9f\x88\xedp\x9d\xdaW62L\x91u\xe8{\x9ay\x8az\x98\x05T\xd0\xe8\xc6\xce\x038\xc6+x\xd6#\xaa\xc2\x8c--\xc0a(\x9a\x87n \xd3\xde\xd6\x05\x0et\xfe\x87\xbe\vo', 0x11f) [ 2442.085208][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200040, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x42880, 0x0) write$P9_RMKDIR(r5, &(0x7f0000000100)={0x14, 0x49, 0x1, {0x4, 0x4}}, 0x14) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x0, {0x8, 0x6, 0x1, 0xf2, 0x5, 0x6}, 0x1f, 0xff}, 0xe) preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2442.138777][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2442.161233][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2442.178794][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x6, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2442.208480][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2442.216011][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2442.247501][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2442.265002][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "000400"}, 0x28) [ 2442.309192][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env 22:20:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x7, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:15 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='id_legacy\x00', 0x0, &(0x7f0000000400)="02f530f825ad582826c07250d1637b99d5a34b783612ec9423561c9c0cfe7b6f34619f269c3d1bc46e5bab1f5368aac0ba9b6906a5bf57098e6d04375c674d038873f1083b970dcc8d8df3fc6068163bae461edc04d1305dc6f494e05fb388b6e00a1edb6a59d97603879da6467970998302eb6011c4b4dbc2ca686ced197670cd1d2c7258d03e020000000000000025f2c5a7e075720d3050f30534b728219c569519fd7be0574456e307b3543937b441625d0b5c94d0e9a6c7af51423c073eb17dcf7db69965aaeaa42e81c31975ea438c3b1e810df7a2dfec59b13c7baa2eb0643e94d579a61d4d314dd8928938df2c", 0x2, 0xfffffffffffffffc) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x7399881026e2bf1a) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x0, &(0x7f0000000140), 0x8a5d426db98d6f63, &(0x7f0000000180)={[{@noacl='noacl'}, {@prjquota={'prjquota', 0x3d, '\\!.'}}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0x298801a2}}, {@prjjquota={'prjjquota', 0x3d, 'eth0md5sumnodev:eth0-trusted/.'}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/input/mice\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_appraise='dont_appraise'}, {@fowner_gt={'fowner>'}}, {@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000000080)=0x1, 0x4) 22:20:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), 0x4) r2 = dup3(r1, r0, 0x0) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10002010}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x1dc, r4, 0x4, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x11c, 0xc, [{0x44, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3dd3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3128f184}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x58185c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5d7f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5426}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6b49cc00}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc906}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e14eea2}]}, {0x4}, {0x24, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4931a57b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1d095b44}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x9cbc5f6}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x55c007a0}]}, {0x4c, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x359}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe06c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1fa0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd484}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa8fb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3fd35fdf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6f888979}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x22d4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1da3c132}]}, {0x54, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc4e7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x74e8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x414b136a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x309a62d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3ae35a6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc76e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x926e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xccaa}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8024}]}, {0xc, 0xb, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf75c}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x50, 0xc, [{0x4c, 0xb, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3705aa09}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x493c5fbe}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaff1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9709}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x82c1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9dab}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x627e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x44809103}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3bdd}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, [{0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x1e5f940ce6b59af0}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x1dc}, 0x1, 0x0, 0x0, 0x1}, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r5, &(0x7f0000000080)=""/80, 0x50) getdents64(r5, &(0x7f0000000700)=""/66, 0x42) getdents64(r5, 0x0, 0x0) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f00000001c0)={0x1, 0x6, 0x4, 0x70000, 0x8, {0x77359400}, {0x2, 0x0, 0xfe, 0x80, 0x4, 0x7, "682da77e"}, 0xaaab, 0x4, @fd, 0x7fffffff, 0x0, 0xffffffffffffffff}) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000240)={0x1e, 0x1, 0x7}) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 2442.372882][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), 0xfffffeb6) preadv(r5, &(0x7f0000000940), 0x365, 0x700) [ 2442.433403][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2442.466169][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x2000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "000500"}, 0x28) [ 2442.546622][ T1683] kobject: 'loop4' (00000000292947e5): kobject_uevent_env [ 2442.563191][ T1683] kobject: 'loop4' (00000000292947e5): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2442.577217][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2442.593914][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2442.626211][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2442.634667][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2442.659979][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2442.667768][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2442.670607][ T1683] kobject: 'loop4' (00000000292947e5): kobject_uevent_env 22:20:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x186800) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x6}, 0x40, {0x2, 0x4e23, @empty}, 'veth1_to_bridge\x00'}) r3 = dup2(r0, r1) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r6 = socket$inet6_sctp(0xa, 0x801, 0x84) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r7, 0x0, 0xffffffffffffffff, r6) fcntl$setown(r5, 0x8, r7) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, &(0x7f0000000040)={0xfff, 0x38414262, 0x1, @stepwise={0x7, 0x5, 0x4, 0xff, 0x8, 0xc2c8}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r8, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x110) 22:20:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x8, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2442.742997][ T1683] kobject: 'loop4' (00000000292947e5): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:20:16 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000100)='blacklist\x00', 0x0, &(0x7f0000000400)="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", 0x86, r0) 22:20:16 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000000)=""/106, 0xfffffffffffffff9}], 0x1, 0x0) 22:20:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "000600"}, 0x28) [ 2442.821759][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2442.829022][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2442.895652][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env 22:20:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x300, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x3000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2442.960569][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:16 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000080)) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='syzkaller\x00', 0x0, &(0x7f0000000040)="04", 0x1, r1) 22:20:16 executing program 5: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/83, &(0x7f00000000c0)=0x53) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = fanotify_init(0x0, 0x0) r3 = dup2(r1, r2) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000000100)=""/120, 0x1000, 0x800, 0x1}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r4, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2443.009167][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2443.046107][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) flock(r0, 0x2) [ 2443.109111][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env 22:20:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x500, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\a\x00'}, 0x28) [ 2443.152839][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:20:16 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x2, 0xffffff01, 0xa432, 0x1, 0xfffffff8}) 22:20:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) dup2(r0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r3, &(0x7f0000000080)=""/80, 0x50) getdents64(r3, &(0x7f0000000700)=""/66, 0x42) getdents64(r3, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) bind$isdn_base(r4, &(0x7f0000000000)={0x22, 0x1, 0x3, 0x5, 0x6c}, 0x6) [ 2443.197775][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2443.219116][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x600, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2443.275310][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2443.308998][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x4000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2443.362586][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2443.369790][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:16 executing program 4: recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000080)=""/190, 0xbe}, {&(0x7f0000000140)=""/16, 0x10}, {&(0x7f0000000180)=""/245, 0xf5}, {&(0x7f0000000300)=""/59, 0x3b}], 0x4}, 0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="0a420080c4f28b5dd4eb78d7e34c28564584e1a084cf030526ac18cdf90d8bfe3c193e31cbd32e6d6c1e449f7bbecd76b3cd796ef7d9564311041b7700ef5c7fda16e908ec637196fe51e55e82cdabdb3f000000dd054ed39d38f5778ae4d1ed052bad2cb01a3266c20d93dfc6c3136bdfd55e4f86dd6d7adcdf170cc1fe6a74c845c8eaa4372bd1caa3d7531dd97678b8", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000480)=0x2c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000004c0)={r1, 0x2, 0x3f34, 0x2}, 0x10) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r2) 22:20:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\b\x00'}, 0x28) 22:20:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x48000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @mcast2}, 0x1c) kcmp(0x0, r1, 0x3, 0xffffffffffffffff, r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) msgget$private(0x0, 0x402) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000000c0)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r5, 0x0, 0xffffffffffffffff, r4) r6 = syz_open_procfs(r5, &(0x7f0000000000)='net/bnep\x00') preadv(r6, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:20:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x800) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), 0x4) r5 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x7, 0xc00) getsockopt$inet6_buf(r5, 0x29, 0x30, &(0x7f0000000980)=""/4096, &(0x7f0000000140)=0x1000) dup2(r3, r4) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r6, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2443.473682][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2443.515945][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:20:17 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) io_uring_setup(0x5fe, &(0x7f0000000100)={0x0, 0x0, 0x10, 0x2, 0x387}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000000)) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) [ 2443.558328][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2443.569877][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x700, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2443.609973][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2443.631690][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\f\x00'}, 0x28) [ 2443.741933][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2443.749102][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:17 executing program 4: add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000040)="f3db2226042db1dfe1abfe4780a1d11147c403000000836718d9fcd3a0fb2853aefe19f3d9ecb4d08605dfdb7bfe55a6666ab8cecfcf2ec23ce0fde8befd9184dd5bfa0e50dd", 0x46, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) ptrace$getsig(0x4202, r0, 0x8, &(0x7f0000000140)) 22:20:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:20:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x5000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2443.842769][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2443.850091][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:20:17 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) dup2(r0, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r2, &(0x7f0000000080)=""/80, 0x50) r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f0000000280)='schedstat\x00') getdents64(r4, &(0x7f0000000080)=""/80, 0x50) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) getdents64(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r5}}, 0x18) getdents64(r2, &(0x7f0000000700)=""/66, 0x42) getdents64(r2, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2443.895487][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2443.916785][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x48000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @mcast2}, 0x1c) kcmp(0x0, r1, 0x3, 0xffffffffffffffff, r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) msgget$private(0x0, 0x402) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000000c0)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r5, 0x0, 0xffffffffffffffff, r4) r6 = syz_open_procfs(r5, &(0x7f0000000000)='net/bnep\x00') preadv(r6, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:20:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "001000"}, 0x28) 22:20:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x21, @rand_addr=0x81, 0x4e21, 0x0, 'dh\x00', 0x4, 0x1, 0x3}, 0x2c) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f00000000c0)={0x0, @reserved}) preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:20:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x4000, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2444.009220][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2444.021890][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x6000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2444.059368][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2444.066993][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2444.086441][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2444.110544][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:20:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0xff00, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2444.179477][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2444.194868][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:20:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "00000300"}, 0x28) [ 2444.278498][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env 22:20:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x48000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @mcast2}, 0x1c) kcmp(0x0, r1, 0x3, 0xffffffffffffffff, r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) msgget$private(0x0, 0x402) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000000c0)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r5, 0x0, 0xffffffffffffffff, r4) r6 = syz_open_procfs(r5, &(0x7f0000000000)='net/bnep\x00') preadv(r6, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) 22:20:17 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') [ 2444.325420][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x1000000, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FBIOGET_CON2FBMAP(r2, 0x460f, &(0x7f0000000000)={0x23, 0x1}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2444.398797][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2444.438018][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x7000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) [ 2444.470383][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2444.489847][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "00000500"}, 0x28) [ 2444.530762][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2444.537954][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x601}, "94644dd5912c9b81", "e967356290654c19375d2b316e1862c6", "c7dcf9a2", "7120b2d0e40fcab4"}, 0x28) [ 2444.607423][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2444.628167][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2444.650190][ C0] net_ratelimit: 8 callbacks suppressed [ 2444.650200][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:18 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x48000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @mcast2}, 0x1c) kcmp(0x0, r1, 0x3, 0xffffffffffffffff, r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) msgget$private(0x0, 0x402) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000000c0)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r5, 0x0, 0xffffffffffffffff, r4) r6 = syz_open_procfs(r5, &(0x7f0000000000)='net/bnep\x00') preadv(r6, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) [ 2444.697843][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2444.706959][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) 22:20:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x2000000, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) 22:20:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", "00000600"}, 0x28) [ 2444.811835][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2444.819053][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fd\x00') openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000100)=0x101, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x6, 0x2) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000180)) getdents64(r1, &(0x7f0000000080)=""/80, 0x50) getdents64(r1, &(0x7f0000000700)=""/66, 0x42) getdents64(r1, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) 22:20:18 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x48000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @mcast2}, 0x1c) kcmp(0x0, r1, 0x3, 0xffffffffffffffff, r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) msgget$private(0x0, 0x402) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000000c0)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r5, 0x0, 0xffffffffffffffff, r4) syz_open_procfs(r5, &(0x7f0000000000)='net/bnep\x00') [ 2444.886816][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2444.904591][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2444.925591][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x8000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\a\x00'}, 0x28) [ 2444.994383][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2445.024199][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) sendmsg$IPSET_CMD_DEL(r2, &(0x7f00000065c0)={&(0x7f0000006380)={0x10, 0x0, 0x0, 0x40000008}, 0xc, &(0x7f0000006580)={&(0x7f0000006640)=ANY=[@ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) recvmmsg(r2, &(0x7f0000006180)=[{{&(0x7f0000000000)=@hci, 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/107, 0x6b}, {&(0x7f0000000200)=""/148, 0x94}, {&(0x7f0000000140)=""/68, 0x44}, {&(0x7f00000002c0)=""/210, 0xd2}, {&(0x7f00000003c0)=""/227, 0xe3}, {&(0x7f00000004c0)=""/119, 0x77}], 0x6, &(0x7f00000005c0)=""/76, 0x4c}, 0x800}, {{0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000000640)=""/24, 0x18}, {&(0x7f0000000680)=""/241, 0xf1}, {&(0x7f0000000780)=""/143, 0x8f}, {&(0x7f0000000980)=""/221, 0xdd}, {&(0x7f0000000840)=""/68, 0x44}, {&(0x7f0000000a80)=""/122, 0x7a}, {&(0x7f0000000b00)=""/4096, 0x1000}], 0x7, &(0x7f0000001b80)=""/199, 0xc7}, 0x7}, {{&(0x7f0000001c80)=@sco, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001d00)=""/22, 0x16}, {&(0x7f0000001d40)=""/39, 0x27}, {0x0}], 0x3, &(0x7f0000001dc0)=""/206, 0xce}, 0x2}, {{&(0x7f0000001ec0)=@rc, 0x80, &(0x7f0000002280)=[{&(0x7f0000001f40)=""/35, 0x23}, {&(0x7f0000001f80)=""/170, 0xaa}, {&(0x7f0000002040)=""/214, 0xd6}, {&(0x7f0000002140)=""/107, 0x6b}, {&(0x7f00000021c0)=""/124, 0x7c}, {&(0x7f0000002240)=""/17, 0x11}], 0x6, &(0x7f0000002300)=""/53, 0x35}, 0x3}, {{0x0, 0x0, &(0x7f0000003900)=[{&(0x7f0000002340)=""/92, 0x5c}, {&(0x7f00000023c0)=""/251, 0xfb}, {&(0x7f00000024c0)=""/225, 0xe1}, {&(0x7f00000025c0)=""/165, 0xa5}, {&(0x7f0000002680)=""/69, 0x45}, {&(0x7f0000002700)=""/138, 0x8a}, {&(0x7f00000027c0)=""/74, 0x4a}, {&(0x7f0000002840)=""/4096, 0x1000}, {&(0x7f0000003840)=""/136, 0x88}], 0x9}, 0x4}, {{0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f00000039c0)=""/138, 0x8a}, {&(0x7f0000003a80)=""/39, 0x27}, {&(0x7f0000003ac0)=""/78, 0x4e}, {&(0x7f0000003b40)=""/130, 0x82}, {&(0x7f0000003c00)=""/161, 0xa1}, {&(0x7f0000003cc0)=""/253, 0xfd}], 0x6, &(0x7f0000003e40)=""/202, 0xca}, 0x4}, {{0x0, 0x0, &(0x7f0000006080)=[{&(0x7f0000003f40)=""/32, 0x20}, {&(0x7f0000003f80)=""/138, 0x8a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/4096, 0x1000}, {&(0x7f0000006040)=""/15, 0xf}], 0x5, &(0x7f0000006100)=""/100, 0x64}, 0x18a6737b}], 0x7, 0x2, &(0x7f0000006340)={0x0, 0x1c9c380}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r5 = msgget$private(0x0, 0x201) r6 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000068c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000064c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x228) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r8, 0xffffffffffffffff}}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x228) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, r11, 0xffffffffffffffff}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006500)=0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f00000069c0)={{0x1, r7, r8, r10, r11, 0x180, 0x2}, 0x0, 0x0, 0x3, 0x1, 0x6, 0x7, 0x6, 0xfff, 0x1b3, 0x3ff, 0xffffffffffffffff, r12}) r13 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r13, &(0x7f0000000080)=""/80, 0x50) getdents64(r13, &(0x7f0000000700)=""/66, 0x42) getdents64(r13, 0x0, 0x0) write$P9_RVERSION(r13, &(0x7f0000006400)=ANY=[@ANYBLOB="1500323030302e4c4854f76e6c9542137c8555c33263f32bb4ec131fb38a1df8abdd283d260b217470da61a5c00770d0477e34bb66edbf7c3bfc17221d1e34c30c8caad1e18e85eddc8a1059eb87866042c2c17f4888706f68f46354207b130f8062fae2c0aff1da4cb98c024a63d812b96e691d5680494e85d4ea8351354612c197f4d5738ebbfc9fd724129dd9c84cf4204c168bf4a8fa1ac9aaf5bd209f"], 0x15) getdents64(r4, &(0x7f0000000700)=""/66, 0x42) ioctl$SNDCTL_DSP_SETFMT(r13, 0xc0045005, &(0x7f00000063c0)=0x1b4) getdents64(r4, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r4, 0x40045731, &(0x7f0000006600)=0x80000000) preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2445.092302][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2445.099566][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2445.106028][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:20:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x3000000, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2445.180200][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2445.203027][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:18 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x48000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @mcast2}, 0x1c) kcmp(0x0, r1, 0x3, 0xffffffffffffffff, r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) msgget$private(0x0, 0x402) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000000c0)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r5, 0x0, 0xffffffffffffffff, r4) [ 2445.265466][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2445.278275][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00\f\x00'}, 0x28) 22:20:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0xb000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:18 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000000c0)=""/117, 0x75}], 0x10000000000000c6, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040), 0x10) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000140)) 22:20:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r0, r1) fallocate(r1, 0x8, 0x0, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) 22:20:18 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x48000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @mcast2}, 0x1c) kcmp(0x0, r1, 0x3, 0xffffffffffffffff, r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) msgget$private(0x0, 0x402) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000000c0)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 2445.389337][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env [ 2445.390053][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2445.414226][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:20:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x4000000, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2445.476882][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env 22:20:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00?\x00'}, 0x28) [ 2445.528352][ T4115] kobject: 'loop2' (000000002b52586e): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:20:19 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) keyctl$session_to_parent(0x12) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x94201) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x1, @ipv4={[], [], @remote}, 0x80}, 0x1c) preadv(r1, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.origin\x00') 22:20:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) fanotify_init(0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f00000000c0)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000000980)=""/4091, 0xffb}], 0x2, 0x700) [ 2445.585046][ T4115] kobject: 'loop5' (0000000083833995): kobject_uevent_env [ 2445.622084][ T4115] kobject: 'loop5' (0000000083833995): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:20:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x48000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @mcast2}, 0x1c) kcmp(0x0, r1, 0x3, 0xffffffffffffffff, r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) msgget$private(0x0, 0x402) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 22:20:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x2, 0xd, 0x13, 0x0, 0xce, 0x3, 0x3b000000}}) socket$inet6_sctp(0xa, 0x801, 0x84) 22:20:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x5000000, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2445.674891][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env [ 2445.685480][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2445.693334][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100", '\x00\x00@\x00'}, 0x28) [ 2445.772297][ T4115] kobject: 'loop1' (0000000031b084b2): kobject_uevent_env 22:20:19 executing program 2: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x280801, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f00000000c0)=0x8) preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x0, 0x0) 22:20:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fanotify_init(0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), 0x4) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) r4 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000100)=0x4, 0x4) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) kcmp(0x0, r5, 0x0, 0xffffffffffffffff, r3) fcntl$setownex(r2, 0xf, &(0x7f0000000000)={0x3, r5}) r6 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="18020000000000000020000000000000850000002c00000094ffffffe5000000f08bfb49c6d938b02b1eedb56312c64466e6898e228aedce2ad5316fac977b55b2ababf48947590ac9243329c1a44726066add031a7e3f08c76385cf22b01c0fa441ed7df054b620e12935349cc3f6eb770c6f51e4dc1cc932b9855b15467988317da8d7a9fac93575007aeaa3e166a3f1b8"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0x26c, 0x0, &(0x7f0000000080)="020043d05d25b666cd783f4b231c", 0x0, 0x8e}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x402}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sync_file_range(r0, 0x40, 0x100000001, 0x4) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r8, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0x700) [ 2445.822595][ T4115] kobject: 'loop1' (0000000031b084b2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2445.857468][ T4115] kobject: 'loop0' (000000009ce6671d): kobject_uevent_env 22:20:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20301, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7006, &(0x7f00000000c0)={0x0, 0x0, {0x6000000, 0x0, 0xd, 0x0, 0x0, 0xce, 0x3}}) [ 2445.889763][ T4115] kobject: 'loop0' (000000009ce6671d): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:20:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket(0x11, 0x3, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000000)=@req={0x1, 0x1ff}, 0x10) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x48000, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x800000, @mcast2}, 0x1c) kcmp(0x0, r1, 0x3, 0xffffffffffffffff, r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) msgget$private(0x0, 0x402) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 2445.940314][ T4115] kobject: 'loop2' (000000002b52586e): kobject_uevent_env [ 2445.945271][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2446.000068][ T4115] ko