"d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:31:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:31:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:31:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1591.490956][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1591.497890][T15145] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1591.517356][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:31:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xe}, 0x0) 14:31:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xcd4c, 0x0, 0xfffffffffffffe5b) 14:31:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1591.592376][T15158] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1591.632731][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1591.648276][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:31:58 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:31:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:31:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xf}, 0x0) 14:31:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:31:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xd038, 0x0, 0xfffffffffffffe5b) 14:31:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1591.754405][T15174] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1591.770519][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x10}, 0x0) 14:32:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xd147, 0x0, 0xfffffffffffffe5b) 14:32:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1594.517975][T15196] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1594.519988][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1594.565612][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x11}, 0x0) 14:32:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xd433, 0x0, 0xfffffffffffffe5b) 14:32:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x12}, 0x0) 14:32:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) [ 1594.790558][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1594.806020][T15216] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1594.823725][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x25}, 0x0) [ 1594.872769][T15223] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1594.947859][T15228] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xd542, 0x0, 0xfffffffffffffe5b) 14:32:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1597.529102][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1597.555209][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x48}, 0x0) 14:32:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xd63f, 0x0, 0xfffffffffffffe5b) 14:32:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x4c}, 0x0) [ 1597.818832][T15252] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1597.835131][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xd74e, 0x0, 0xfffffffffffffe5b) [ 1597.915098][T15262] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1597.928542][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1597.961264][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1597.987722][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x60}, 0x0) 14:32:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) [ 1600.555012][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1600.556962][T15272] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xda3a, 0x0, 0xfffffffffffffe5b) 14:32:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x68}, 0x0) 14:32:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x6c}, 0x0) [ 1600.817416][T15287] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1600.831423][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xdb49, 0x0, 0xfffffffffffffe5b) 14:32:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) [ 1600.857069][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1600.860085][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1600.924762][T15298] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x74}, 0x0) 14:32:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xde35, 0x0, 0xfffffffffffffe5b) [ 1603.585917][ C1] net_ratelimit: 2 callbacks suppressed [ 1603.585927][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1603.587236][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1603.624059][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1603.636353][T15315] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xdf44, 0x0, 0xfffffffffffffe5b) 14:32:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x7a}, 0x0) 14:32:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x104}, 0x0) 14:32:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) [ 1603.889181][T15326] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1603.899569][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1603.911756][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1603.915833][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1603.979875][T15336] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1603.999055][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xe150, 0x0, 0xfffffffffffffe5b) 14:32:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x300}, 0x0) 14:32:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) [ 1606.613132][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1606.630149][T15354] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1606.641212][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x500}, 0x0) 14:32:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xe230, 0x0, 0xfffffffffffffe5b) [ 1606.661673][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) 14:32:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xe43c, 0x0, 0xfffffffffffffe5b) [ 1606.761690][T15368] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x600}, 0x0) [ 1606.889819][T15375] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:32:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) 14:32:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x700}, 0x0) 14:32:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xe54b, 0x0, 0xfffffffffffffe5b) 14:32:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1609.646925][ C1] net_ratelimit: 5 callbacks suppressed [ 1609.646932][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1609.648548][T15389] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1609.678424][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x900}, 0x0) 14:32:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) 14:32:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1609.703074][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xe837, 0x0, 0xfffffffffffffe5b) [ 1609.749688][T15399] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1609.762894][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xa00}, 0x0) [ 1609.806239][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1609.846411][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1609.854792][T15412] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1609.891947][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xe946, 0x0, 0xfffffffffffffe5b) [ 1610.035949][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1610.049328][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:32:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:32:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xb00}, 0x0) 14:32:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xec32, 0x0, 0xfffffffffffffe5b) 14:32:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) [ 1612.675737][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1612.687533][T15424] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xc00}, 0x0) 14:32:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:32:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x6c}, 0x0) 14:32:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xed41, 0x0, 0xfffffffffffffe5b) 14:32:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xca0}, 0x0) [ 1612.821698][T15437] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1612.827391][T15440] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.0'. 14:32:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xee3e, 0x0, 0xfffffffffffffe5b) [ 1612.899982][T15449] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:32:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xd00}, 0x0) 14:32:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xef4d, 0x0, 0xfffffffffffffe5b) 14:32:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 14:32:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xf239, 0x0, 0xfffffffffffffe5b) [ 1615.718150][ C1] net_ratelimit: 7 callbacks suppressed [ 1615.718166][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1615.737841][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1615.749842][T15465] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:32:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xec0}, 0x0) [ 1615.797510][T15472] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1615.819458][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1615.834917][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xf348, 0x0, 0xfffffffffffffe5b) 14:32:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xf00}, 0x0) [ 1615.869307][T15479] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1615.907710][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x1100}, 0x0) [ 1615.913798][T15485] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1615.921948][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1615.962655][T15488] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xf634, 0x0, 0xfffffffffffffe5b) 14:32:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x1200}, 0x0) 14:32:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xf743, 0x0, 0xfffffffffffffe5b) [ 1618.777916][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1618.792224][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1618.799789][T15501] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x2000}, 0x0) [ 1618.853838][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xf94f, 0x0, 0xfffffffffffffe5b) 14:32:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x2500}, 0x0) [ 1618.894348][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1618.920293][T15512] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xfa2f, 0x0, 0xfffffffffffffe5b) 14:32:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x4800}, 0x0) [ 1618.978421][T15520] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1619.020190][T15525] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xfc3b, 0x0, 0xfffffffffffffe5b) 14:32:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x4c00}, 0x0) 14:32:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1621.825502][T15530] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1621.863196][ C0] net_ratelimit: 4 callbacks suppressed 14:32:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x6000}, 0x0) [ 1621.863201][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xfd4a, 0x0, 0xfffffffffffffe5b) [ 1621.898134][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1621.915207][T15543] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x6800}, 0x0) 14:32:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x6c00}, 0x0) 14:32:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e22, 0x80, @remote, 0x2}}, 0x7, 0xf46d, 0x0, 0x3ff, 0x40}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000240)=r3, 0x4) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1622.006065][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1622.009682][T15552] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1622.029554][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x7400}, 0x0) [ 1622.066036][T15555] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1622.094432][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1622.120929][T15559] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1622.121644][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xf743, 0x0, 0xfffffffffffffe5b) 14:32:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x7a00}, 0x0) 14:32:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$bt_hci(r4, &(0x7f0000000100)={0x1f, 0x4, 0x2}, 0x6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1624.884577][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1624.887756][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1624.903292][T15569] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xa00c}, 0x0) 14:32:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xd433, 0x0, 0xfffffffffffffe5b) [ 1624.948561][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) dup(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr, 0x8ab}, 0x1c) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f00000001c0)={0x2, 0x4e22, @loopback}, 0x10) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x24002, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000280)={0x0, 0x7fffffff, 0x9, &(0x7f0000000240)=0x8001}) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000140)=0x83c8, 0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000180)=0x80, 0x4) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f00000002c0)=0x6) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) 14:32:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$bt_hci(r4, &(0x7f0000000100)={0x1f, 0x4, 0x2}, 0x6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1625.029810][T15579] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1625.044702][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2, 0x3, 0x6) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WOWLAN(r5, &(0x7f0000008b80)={0x0, 0x0, &(0x7f0000008b40)={&(0x7f0000001800)={0x30, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x46}, @val={0x8, 0x3, r7}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x84000200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r6, 0x100, 0x70bd25, 0x25dfdbff, {{}, {@void, @void, @void}}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x44000}, 0x0) [ 1625.112897][T15586] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 1625.210914][T15596] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$bt_hci(r4, &(0x7f0000000100)={0x1f, 0x4, 0x2}, 0x6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 14:32:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "c8522ed3", "e9766160da3f00"}, 0x28) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000140)={0x8, 0x32314247, 0x1, @discrete={0x7}}) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1627.892902][ C1] net_ratelimit: 5 callbacks suppressed [ 1627.892910][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1627.916978][T15601] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1627.957963][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1627.995898][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$bt_hci(r4, &(0x7f0000000100)={0x1f, 0x4, 0x2}, 0x6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 14:32:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r1, 0x80605414, &(0x7f0000000140)) [ 1628.067104][T15620] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1628.087385][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 14:32:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$bt_hci(r4, &(0x7f0000000100)={0x1f, 0x4, 0x2}, 0x6) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1628.152574][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1628.176413][T15634] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 1628.206820][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1628.303823][T15647] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$bt_hci(r4, &(0x7f0000000100)={0x1f, 0x4, 0x2}, 0x6) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000040)={0xa, 0x4e26, 0x0, @loopback, 0x2000}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x83, &(0x7f00000000c0)=@assoc_value={r5}, 0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000001c0)={r5, 0x10000}, 0x8) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000140)={{0x3, 0x0, @identifier="31005d1b4ab899111a722ec4ee25f426"}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 14:32:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x4010000}, 0x0) [ 1631.000518][T15666] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1631.013334][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$bt_hci(r4, &(0x7f0000000100)={0x1f, 0x4, 0x2}, 0x6) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 14:32:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1631.063179][T15674] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1631.125442][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1631.159419][T15685] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004044, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f0000000180)={0xa7, 0x6}) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000200)='./file0\x00', 0x9, 0x5, &(0x7f00000004c0)=[{&(0x7f0000000240)="8da9ade7035200c2fe7c1ae603688ba9d6cf1910", 0x14, 0x1ff}, {&(0x7f0000000280)="fe7cbd4007ab28e4ecb10d2a47d4822efa37042d62afc1271627adf7b963982338", 0x21, 0x5}, {&(0x7f00000002c0)="a9712b48132bfe64fa0ba8b977b0e695193977f00799411f2bca568102af274546c86b0b89feccd397f06d03d82b1d27033bb2454a83b2a8e18d54b851ed1b92e53a91b23a559e8a4f573baa2738f83560bccf3f13355c", 0x57, 0x10001}, {&(0x7f0000000340)="cde1de8691d4f4fa39a61344b34b50f13c2ad626f307d2ce130585cbb2767f9e3e7dda4f9b6b71da0393b94be71d867453a629ffe6b82f79d73aa98378008334947d688b5d1511fde5493f3ebc74e0fd3bd89564bfe253ed478f0c588c77d4e301f1f5b4982ae6c0802dd2d0198c9c0f9714fd3a350f189cf7e18ad7afe566f5a0eff242d5625237d9a2af13b4b3788437ba12551a757321bb79a0598e17250776c917de9f5f1e61ac35ed552e94a8ccd1f2799db94de79c18b374e98f77b825b338d8af79537560b94d", 0xca, 0x9}, {&(0x7f0000000440)="02bb9b7156bf97def83d098294d4bbbf6fdcf327c6a6d1bf75b7eb5864ed1a939599b985c36f6af84ae0f8e4ef9b5e127ec4b397b2bab88036fec7ab8316e89bd17ab82b967e9210cde25443262a77bbe1dc63cab59c22b5f8b390fd04547730665705562ec1f3deab9a40c81c52fbe30a40c729a0871382c2b0", 0x7a, 0x10000}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB="636f6d6d69743d3078303030303030303030303030303032302c757365725f78617474722c6e6f61636c2c626c6f636b2d616c6c6f6361746f723d6861736865645f72656c6f636174696f6e2c6e6f61636c2c7461696c733d6f6e2c61636c2c5178706f73655f70726976726f6f742c626c6f636b2d616c6c6f0061746f723d6e6f74657374342c666f776e36d48b", @ANYRESDEC=0x0, @ANYBLOB=',euid=', @ANYRESDEC=0xee00, @ANYBLOB="2c7365636c6162656c2c646566636f6e746578743d756e636f6e66696e65645f752c736d61636b66736861743db82d89de083798fbcc93f0925bf5f6b8a0514f27c2894303a03cea96416d6f2bf36473dd778e376c4df9b3a4872d026ff485b9cfe2269fb944bcebe36c679557bfe9dfff9437b30fe0bc00800000ade483286a76a00458a8ca84b5978a6ecb4cd8d2e682d7b70177d2c95cb007dc03b7f76a15837ed0ba80614e2eb36e2727"]) 14:32:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 14:32:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1634.024127][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1634.025583][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1634.052712][T15700] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) 14:32:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1634.133957][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 1634.178832][T15718] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1634.185784][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1634.255116][T15727] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000140)={r2, 0x40}) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 14:32:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1637.040748][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1637.043816][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1637.071728][T15738] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket(0x2, 0x3, 0x6) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WOWLAN(r4, &(0x7f0000008b80)={0x0, 0x0, &(0x7f0000008b40)={&(0x7f0000001800)={0x30, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x46}, @val={0x8, 0x3, r6}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, r5, 0x20, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x80, 0x56}}}}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xfffffffe}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x181e42c4}]}, 0x70}, 0x1, 0x0, 0x0, 0x20048804}, 0x80c4) [ 1637.082304][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 1637.173885][T15745] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1637.184712][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1637.190089][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xb000000}, 0x0) 14:32:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1637.254507][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1637.306320][T15758] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 14:32:43 executing program 5: write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000300)={0x18, 0x0, 0x0, {0x3}}, 0x18) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CHAR_RAW_RESETZONE(r2, 0x40101283, &(0x7f0000000140)={0x4, 0x80000000}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x7d, @rand_addr, 0xcb}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) r5 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)='r', 0x1, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=ANY=[@ANYBLOB="656e633d706b63733120686148775c9ba39c73683d726d643332300000000000000000000000000000000000000000008000000000000000000000f6ff00"/79], 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000200)={r5, 0x51, 0x1b}, 0x0, &(0x7f0000000240)="502c6862ce2de50b716ff9773d70753618e5b77463e96a785bb35ece9b0758e04258ff6bfcdb1c38bcd4fe9bc794e6ba6f90b217ca30d1c63b5577b287ae321d3a4a1ddb66217cd48e270cdb7f77d7c9a7", &(0x7f00000002c0)=""/27) tgkill(r4, 0xffffffffffffffff, 0x11) [ 1637.427439][T15769] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xd000000}, 0x0) 14:32:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000240)={r1, 0x0, 0x6, 0x1}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c, 0x80000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup(r2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f0000000140)={0xffffffff, 0x3, 0x4, 0x2, 0x91e, {0x0, 0x2710}, {0x5, 0x2, 0xff, 0x5, 0x1, 0x4, "6efe0f7f"}, 0x6bf, 0x4, @offset=0x100, 0x6, 0x0, r6}) listen(r7, 0x7936) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x4e25, 0xfffff804, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)=@bridge_getneigh={0x84, 0x1e, 0x200, 0x70bd28, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x4e889, 0x104}, [@IFLA_TXQLEN={0x8, 0xd, 0xa}, @IFLA_MAP={0x24, 0xe, {0x0, 0x6, 0x6, 0x5, 0x7a, 0x7}}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x3}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x1}, @IFLA_LINKMODE={0x5, 0x11, 0x20}, @IFLA_WEIGHT={0x8}, @IFLA_PHYS_PORT_ID={0x4}, @IFLA_ALT_IFNAME={0x14, 0x35, 'team_slave_0\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) [ 1640.065669][T15781] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1640.077133][ C1] net_ratelimit: 2 callbacks suppressed [ 1640.077143][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1640.133331][T15788] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1640.160242][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1640.188283][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 14:32:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x8002) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000002ac0)=@gcm_256={{0x303}, "e38f295d24541301", "a84c0e219fc53e8ea5283edb800fa6d3dbb51c587577edabe30966b3cd8a1332", "00000100", "09119debae0b4509"}, 0x38) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x6, 0x242b40) getpeername$netrom(0xffffffffffffffff, &(0x7f0000002c80)={{0x3, @bcast}, [@netrom, @null, @null, @default, @default, @remote, @default, @null]}, &(0x7f0000000180)=0xffffffaf) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r4) getsockopt$bt_hci(r4, 0x0, 0x3, &(0x7f00000002c0)=""/238, &(0x7f00000003c0)=0xee) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setreuid(0x0, 0x0) syz_mount_image$zonefs(&(0x7f0000000400)='zonefs\x00', &(0x7f0000000440)='./file0\x00', 0x401, 0xa, &(0x7f00000029c0)=[{&(0x7f0000000480)="2e5051960f14905eb118d2166fa982414f5e2c36e7e6f9b881198ad4a0400b0ca79748f9a936b01def8feedf584a7bbb3161b1689f3caa3ea74f4e24bdce69f0aa0ec87263f4427b536f521f73bd83594c0c3c075596c0de61bbdf90653a705c1710f2b5f9bb00", 0x67, 0x3}, {&(0x7f0000000500)="0a413c640c344428dd66fe6e04a15d8b30bb40ebfd9b3fe2adc28cbc4a92f4d944205b5f376b7aa76eeb301a0f", 0x2d, 0x4}, {&(0x7f0000000540)="a041ff042de0632ea400df0b8e009faaaabb0995ec53748c78a8d1d99d8014e2955f92e923eea43e602f38db3b8f7785716e35b49322ca0b65c9c8dda03d83168f000ecffc47f187ef1005346b562a44ed74b00d07889d9200bb93f2cfd2b181f56f3e145d1feb66ca8eb0108e9a69fe32f259a4d5901f4d08c5d0ba336da48ba827edcdea18d48e5ee504c12937a96f2e1158c36d4215be70903b1c75ae2a9bc42013bf0345ac461f3caad0206184aa09dd91f3b1da4d6db9", 0xb9, 0xfff}, {&(0x7f0000000600)="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", 0x1000, 0xe8}, {&(0x7f0000001600)="a7c4536b32221fd0ad6e1120a7b8e89d37dcdad64d497ab7affe323a563d45d8b202661fd6f6a6e238f2c96b1f5fd5221c2fd9e67ddeb18af910009a045aea6d0754cec78ecd23bf23c6b64f5d42f808dce427ea8939f17e11a958882f4f27108d332e3fadaaf3c555f5803ea98f59b18e191589d6e51ccdce4e7dd86e757a3171b03cefdbb25ff959dc76fcafec1bae373cbc90d0cb", 0x96, 0x7}, {&(0x7f00000016c0)="81e80cb9ac134be51ed9a68b2a7f9e0e3380793d814528d80160f155b0544ead989937391bb4c25609afab419d31d5e2b56e1c70a819058015d586dd28aff126c49767bbdb06c9bc22c18e6766bdb0fa5eace8bfddde38653e3fa86bc93d63b016f9931eff0dfe5513de1a62d2306a5d50ab66b177732d6fb0857140320a6b8ffaf3271ac7b763c818c4decc2468a6708d64777811f1f6e5bdb8609a4c995401af0efd0a4d73f08d2b6bea11a3cb02b9a43cd7b50f281cd386df8ec280d800807526bf6a1850717acd43e81abe8f66ba20722fcc12c3bb1dc0b29c89985543d80ea49564ee", 0xe5, 0x100000000}, {&(0x7f0000002d00)="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", 0x157, 0x6a}, {&(0x7f00000018c0)="5d9c45ee9dbbf485f3e64df9e5a4fff8253133", 0x13, 0x200}, {&(0x7f0000001900)="530475a3ad31c0c53ed509162af9b25f3588e01019c6f21e38645909e79767bd375bd75279027a4222d47ecba5740aa3d10f61b8855146309bd89d66bb5378a91f165d8b58608019f8622a68588b116d2d89c78d53d07aea4deccf9fa9f853a1744024b13936e6488aee4e71384ec8d0e166f33ddb456937f8741f62ad932fa062f81146cd4cb5171936e91ef390c48dbe16e192cfd2d7f2d9b99d1aea6550ad0a82865d594ebfbac7f355de7c36c2e6d5f1a2c2b6735a2c29e8a28759790ef4e36e8813d1149e6f9145bbc2720c08205a7403dee5fab43ddb3f9fe638d39ab9b5e308a048b1ec5b1036ea0bc36497bf073f317aac902e2454a8b7b67fd351174ff4697308767136232a17576a243d3628a80624b2aa3b0d382e633582150a552a3741854df07c02465438dfe97559e89538dc4d78396d9293934e4c0e8d8fc93237c9812ab51d59f356f65e1858dd11ff63ef6c2feec46fa530db9920a7c0ff49e3b821781d3a18b489b0a7e4a0795f1b83c11e4f9730d13d1da3436a31c74f0349c533f6d8b20227b43bad86613208545ef7bf38cc2f8d6b9c72a761124175e6d6ef819b09e3d5e7c6039c14ae639421cfa00d0c651c1e386df8d0c1ec2bb7f491e5da71425882676dbc8f2bcf5d67f6f6ba5a8b68e7ac81aed85b314e76cf5553a99e7cbc1fab84ec7a5af448ac475d5ccf3aef5a5fda30d9dd9bf0828a973b055e3d19fdb34d0ab940a25d0cf90fa4041994539a287e8ca75d7bf4c0404d89ef946cbaef787c570b891b6e699a83017bd48cc0318c867da1932b3676722d8a16f14561d5d5b280304e43d10173dcc218dbc97a4fe7508b8d08ba0103e7311674069c9df0b30344af470592d306f5882af4d1e86b3c727d0e93973e4c5eb1bbf3d63b20c9da53a5bbe848b875d4985f64024b853d094ddbc41bf701ff0b521eb1ea4f1fb9e627ef9605cb3372806effae63425116f331c2b765ac94684fd7d44680da43f3aea70d87df301e89bd0c1ee7cec11fda7a51f687cf69225b70c05f073d87a6407f01e36bccccecf5db35e637e6797153aff865210764c044f5b7cae3ba2888af1526ce85b859d1b3686089dec715b1732add36ad41991c6b00dd7d2d17eba9f20abac44869cf88fce19bc18ccd79676e2c53bcf7f2c1ef09234f67091b1c3dac8c9dbc68ad5790cd35796cbc909dd68ff9295b37e7ce162319c3d12c8ce43fec850a7ba3e572de3f390fd91c99b847d8fdeb32a7e5c91b9d29312dcaaf41c2646d83c7b5ee7c0d9734f4e997404e748d5b6de6f408f7d5473e07d028e62c00a296fda3d122344fde100ab50e1e1a3de4288b57cb2f2672f372c952b7cfdc5f8c2ea8bb725e494d0ec86b5b9564cf7274c4ebc4b0cb4a62e5d8c056e31bc59ad1dda106323555ca5463c41e56c77654d6cdeb9d55132dde2d6bc20cd5b88282552896be69be1c1324d817866af0c68ea5cd4e94c6557a46fd6b5cf16fb838580af6914af23c6d6979d3f7d33787a353909f8b689da39a1dffcc36ef6b2b4936861ab0403652e6099b5080ac36440b779c87bc779a039dd91a65717ecbf9a99a8adc04e39bda44db1032bec7eac1df7f686b12b1d81eda331f8cc2ff6d8953a7bf5555f7bbc35332b6202aac01576f724feaeb245ae124f27fc5bf0adadca2234a40dc9e3537d9f849240020acf1617be7f3228aab8b24373610267fbbaabb0af0e76d3b9ed1c2f978e8faf34789b8479bfeabb64e099c95abc0835e31d185994dc76aa7adf883bf367d3724582ea002a31fb96621293654d5a7827609a6e62f3afdbd81a32046a05f9c6a706f170a987586ea4e2316528563fbad5e074534ba3c4cdad573f77303030a8944c030d812d25ced191a5c5ec9d93933ff11be2ee3d39282f73569908ff934b26ed5e49c9de57e7fd2479b122bff521b63665fccba8dc356412ff4d551417aef4f46e1ab1dc56712b12534f6afdcedafebdfd66ad189222f5a1aa7a7d614ba4e4fcde7f0c2d413124de97cb25c55068833c81e941cffeca753d2b171f228f9327b9b78b3311d739b1485044efd120cf52cac90314d01f26ec5701e6a637146e9431874f19408dc19152168ec5f22a916c5a3894b1db51fc661a4cb1734ca9faa1a9f804513f5baae5eb0a4cecafd3e4d600b852f4399a0c38a8956781565e05c909423e3cb58c65589b1c992391228ef22404c7796c71d425dac6d63614dce5743c2d7b7a87f28118aa0bd5959dcc3606d6085caaaf073621f4e7026b32d9d5889c6871204b1be2fd70a6348befabb4188265767f2c67c3ce89064ae360417d986542ded7287db571d97a93ad2bc9e6c5e087e39b61357b204ee929d6f83d3c0e6728229fb70158bccfeb4c5a6a34ba9ba7b171d76dc8454489fd0864eadd6b2be77d49531a4bb634257708a8c589a78fd7545133d0d215736eecadf5e2fd0d4e0ee8c1099b814a446e44a5189f0344557cc6c1cb1ea5ed4d4d9749ba2804c56171c13fc9a08a0442043c9be96f98aaa85f741a48f53d159e396899d18effd5ffa526c011737bc2b6e16ad8daf258c5f183b502ed4b2c601f45a73c20b220c1c36abf893139573d4906748030f21d02c89144870046fe9d0be83237c90d714e8b99c01886ec9a9da844984c5fc5aaf146130adb74d026e40d3f85003a75b652cb09f30f0dc79b1ca60ffe3e91132b175e0cb89e72abe62b0cb140aad3edc46e32c8ee1910b120070cc614c5c77a8b6d3d1a5a165fc8df30cc0358f44bfdb55b97f9f18b403f55c579ce4b2fb85a1c93a191e448e23f4fafd93362cc1cc0747eabedf2162d8a420d37c6be47abb4bdebbb4b6585e9abce86fbfee8b2165433f83123ebc2ff0c4fcabbe518cd1f1a908801e36b030fb87b0f416d2b4bce68f2c0545fdaa72c103efe5dfe8e487af25e42a0b8a84b90309a6819c8c8011fef50fcf788c2de537b1ccdb235c46d3e5b538d2c0c0f71549325bd4795c7e7dcdafcbebcb095a5b65bf1d48806351ee7acf2575f33fcb44210f8c3363dac2992bddb740a9851478101357f7f29c8b8a15cf4a876cfd17c6b7fabb0e77ce624436df89f538b783316653d0ed51896d648a023db443b1598b817f7420be3d8700891400409959b8a616bbbdca17237e4d3f7a1cdedfd6060a7a803145e70092e8009d7a4f8e470cb616fe4c17943d70ff7e6a73a5f23c19d7762f5725c10f0953fd8f0cc52e36e053cfb047b46e74b331c4b1edf9fe2a5b330b7419454a8ed7da7fc75cc7f8f2cce2d4b6eaf24b865c411480072a7b8a10e77fe35a26d3a9c743b67ff9c519979b1e7217adec66e7de0a01323b669be5a8decf9586a1b598f7e953310b50eed3bc911ee9767c17421a1477585950e30cade9af371901de0a0069dd782e1fc76040e37cde3afb4a106771bfb73ccf7bf9b3e82bd6154b52665e96ad22ec813265912a5b2acf4c75c0d17266070c130a802888a150238f707505fe3b9eeaf750443ac8542a59f8694202845b39296270471005a885fb90c2672625a8a4a6cc7e10c6e3832c4a9244cbe9a41bb2125b1b182f367579af172c9febaedcc44da034d3ce25ea779f24860e6b80fcb362de6acf9cdde0c2bd08eafdb8720c1a6b6c9817de5f2868ccb529fc8a5c7b480175e53c81efd6cfb37e28784828485c6bc6099cede88ca0b7d792b823838f943aad7b71f535da5a866cdbf108444e40b64ea5581499a3cb4044f24169e8935bb22a869f03b718cedd8c4eccff00a4a35d9f4d8d7f6fec9e1df8eac391b08ec2a339aa4b1a43ec2260d688cb216667ce87b55ca8dfea9af7b238a79939444be5f4ac412a7ada5db7ff48a8f43d9f2131f2d81c64db8e47be98a3f2c2637fcd6013de361c895cd7e15ebdd32bdc2e611279d2e784bf2018ff7ded2c4ef23cf5f32b13ca95d67ede3e3ac261a60f1f84a5a74a129e499589456600a09a0375b0197891528e5e4fa45f975d610d0ef595fdf3fc372275b3989e8cd42b684af7ed28f84b429f2159df5aadb3b5bbe58bf9f69890bcf2f398ed23e748bb9977c793bc025d0322746318e4c578e69b0b20129b5a68e45cc5c5e6220ff4e08f23cdf53b3ab578018c200dbc108bd3c91ce9afef23aa1d5381d86e03c02913ab0d1381accdd9295e75ff5247c4f1a2b106472f8888bcd145698c5b9a0fc6be66d52399a235239a0587ae7f219967d09f838c755736e380fdbb99c3d433178ac209b4f77a82d5e5c94d8bc561c077aef32c41f8fb7fdb3f76ff063a12dca9cd3b9d9be59ee2f5cc9b6debf72e4acf548be49f5ee2745e785bc032a8ad8bb0823218762690b8b1ca3a26eae6add4d776a6983f139b10c9d68c57b37afe5801a064926a2ebe5f634348281e38942e4f3b518ef29b94f5775b0982a5862aedf17f9e5f003d0c51b3a8eb2869129d3b13e7a648538be05d3631d1485edab7084b87521c07d4757ac4388039a687a32afaf2990230e860a8d2cc5760b588d9713a875e269832b16409e79f4258a72181e8a15cd45670ed73d7751747029f091f57a9c53495dc6a36032ec77b44e7e207eab8c7aa236350f0da7baf9e2a7ac0658ba93a8816e82781bd8284b5d467a16182e38ac3ad585519d06364383a29e259aa3a3fa3ba049b34292759baec289ae96474efa1046a6c543f9eab8508e3a966f2688dcf3085528eb688f3351eeaa8f533a4bfd23aa71968d415a6c86ea97e51c799da26659f277a46e55fe82e94d8bb2b2c7c92f47ca79146e80369401db6825a9d2e8d83e5c7a7c00c328761e4c0ec4e988ebee3a6e5566451f281b2af789edbadeb1bf96d0471afc59021ecbd72156a599647b104c771b2e7ae33d144147755633c90ef59e1aceb72eeb13f0f358d27f56de9208fca4121fbda37307b8e6a3d8219236713724a76f9ea7a5fe6648205f2b4e6473136d31a60f38c6167f7d7e879dc94a05f9e0668db08cface78b4b3954c52438050cd29f10045c23d727cb742df19d455a252e432ed9638b82eed3fb5c4187d2438c57066f91e515863761a7cb4a133ba6a08fee44255a05297c113792eb1a4587bb350fb4448cf9f21ebf80f6ad74cab42aef4e9e63318ecf6af5ffbac51b1e601f03b9bde566234071818966ca1878925f9d5ee255ee616e6885d6e682cdec655a25201bcd65300e6f716e81b105e4745e97219f78dc6860844f1482452a2f957dce473c1c449beb1673b6cfeb007670642bb4fb0fcc6c657363b3a7f12f2c844f5807f4f5933769fd270cc5556e262ce07dea0d244449cdb6a251e4ca6daf4870a87c4742495517efaf09580fbcbabcacfb0c9b999a130491f2c9817c0c7c010771d2c03cbd578658c5d3977b5e56e96915b93e535c044559106dd101480d32cdfca45a75db0295a1457dc191d7633d799085ceead6cdf78e22196e756e768b977a0b9de350d4c68e07ba721a01036d0979b8936918f39b53a0a30aba5bcc20cefa52b2d79e5b712915303e5d8020b995482a1277d18ebd2ad6f67908ce83e4e79e3b09685dd10ad55bee63b5b3523ff410ae1350eb4fd904a3152e53ebacfedd33adc868e786e7b14be9eea8aac9570fc4b4a7254bd874a741a03361df7d1e02ab13b86550ea23e7cd01e1357515f32c0f643a7c5677f8564bc09b8339140b8345cfdc8fd6f3c26b92503c00c3dab4b9206e0c682e07c72d5908a0a0c1c1822d5fe3bacf6ade277ce75505126c665eadf2e3c1717bcd8d137fba40809bed202b8b10947683d893af969387f4695b807d43f6", 0x1000, 0x1}, {&(0x7f0000002900)="3832a8d8099a1093f0795b4c3dc4ce769cf50216cd15910056136d8f375f11c85c809652060f3fa88abcf08df01b66c7ce95a8ffb5f24f12292b1562204945257171c530c3ac119cb8bcf88c58c61ed1a1408c44752374d6e361636d864d1c0dedda7efa3b0e7503c5f29f49dd6e998499c3a21ea0d7ed2bd210faf6b6f0ddb005ae0ac70be85ac981990d488c4af531a86a4cda72dcbb608d68a6c6bf53a9beb384ae22da6f19", 0xa7, 0x9}], 0x48008, &(0x7f0000002b00)=ANY=[@ANYBLOB="6572726f72733d7a6f6e652d726f2c6578706cfe105004673acfce696369742d6f70656e2c6502726f72733d7a6f6e652d6f6666f72ea189e2de1579696c696e652c6578706c696369740d6f70656e2c6578706c696369742d6f70656e2c6578706c696369742d6f70656e2c6578706c696369f42d6f70656e2c657569643df001c39ff24f98f0f181d2b036686d4d3b7766b47959d000a172ef7f3fc5ee6cc3622c7a2b01771f1999f4c3005c65b4d8e45dd2577c0051602c9dd6d8a1074c4385c50dae2d7a7f516c1f750fedf802dbd369e57b2a92f651f3ce", @ANYRESDEC=0x0, @ANYBLOB="2c6d5d736b3d4d41595f415050454e442c736563046162656c2c66756e633d4649524d574152455f92515be6b929fc37a9db12cb2195de9f204576c70ce6aafd83cc121e45d7a637af1bb2f37ff021e9fe53fbb751b237da2144fa5ba804ffaf1ecacf3bda0879e212c6dfdbf8988d20d20f06d93419137b9e5b"]) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000000240), &(0x7f0000000280)=0x4) 14:32:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1640.355372][T15803] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1640.366884][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000300)="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", 0x17f, 0x4000040, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) r4 = syz_mount_image$udf(&(0x7f00000032c0)='udf\x00', &(0x7f0000003300)='./file0\x00', 0x6, 0x1, &(0x7f0000003380)=[{&(0x7f0000003340)="8a92bf7d88b962244601e3c40a0bfb72906c9983976c68acea840d9e6be9b3e94bff0a", 0x23, 0x80}], 0x2000001, &(0x7f00000033c0)={[{@mode={'mode', 0x3d, 0x80000001}}, {@anchor={'anchor', 0x3d, 0x64c8}}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@umask={'umask', 0x3d, 0x7c}}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x62, 0x62, 0x66, 0x33, 0x31, 0x34], 0x2d, [0x65, 0x62, 0x8083a82175d6a03e, 0x61], 0x2d, [0x62, 0x37, 0x31, 0x34], 0x2d, [0x34, 0x64, 0x36, 0x62], 0x2d, [0x65, 0x35, 0x39, 0x38, 0x5b, 0x31, 0x62, 0x38]}}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@smackfsroot={'smackfsroot', 0x3d, '\x00'}}, {@uid_gt={'uid>'}}, {@fsname={'fsname', 0x3d, 'bond_slave_1'}}, {@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}]}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$AUDIT_SET_FEATURE(r5, &(0x7f0000003280)={&(0x7f00000031c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000003240)={&(0x7f0000003200)={0x20, 0x3fa, 0x110, 0x70bd26, 0x25dfdbff, {0x1, 0x0, 0x1}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x45) write$cgroup_netprio_ifpriomap(r5, &(0x7f0000001d40)={'bond_slave_1', 0x32, 0x34}, 0xf) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000140)=0x1, 0x4) clock_gettime(0x0, &(0x7f0000003100)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002f00)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000080)=""/3, 0x3}, {&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000480)=""/202, 0xca}, {&(0x7f0000000580)=""/254, 0xfe}, {&(0x7f0000000280)=""/88, 0x58}, {&(0x7f0000000680)=""/190, 0xbe}, {&(0x7f00000000c0)=""/47, 0x2f}], 0x7, &(0x7f00000007c0)=""/165, 0xa5}, 0x40}, {{&(0x7f0000000880)=@can, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000900)=""/110, 0x6e}, {&(0x7f0000000980)=""/29, 0x1d}, {&(0x7f00000009c0)=""/211, 0xd3}, {&(0x7f0000000ac0)=""/94, 0x5e}, {&(0x7f0000000b40)=""/251, 0xfb}], 0x5, &(0x7f0000000cc0)=""/119, 0x77}}, {{&(0x7f0000000d40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000dc0)=""/148, 0x94}, {&(0x7f0000000e80)=""/31, 0x1f}, {&(0x7f0000000ec0)=""/202, 0xca}, {&(0x7f0000000fc0)=""/11, 0xb}, {&(0x7f0000001000)=""/100, 0x64}, {&(0x7f0000001080)=""/238, 0xee}], 0x6, &(0x7f0000001200)=""/35, 0x23}, 0x1}, {{&(0x7f0000001240)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000001680)=[{&(0x7f00000012c0)=""/147, 0x93}, {&(0x7f0000001380)=""/172, 0xac}, {&(0x7f0000001440)=""/169, 0xa9}, {&(0x7f0000001500)=""/211, 0xd3}, {&(0x7f0000001600)=""/37, 0x25}, {&(0x7f0000001640)=""/47, 0x2f}], 0x6, &(0x7f0000001700)=""/36, 0x24}, 0x3}, {{&(0x7f0000001740)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000001900)=[{&(0x7f00000017c0)=""/18, 0x12}, {&(0x7f0000001800)=""/220, 0xdc}], 0x2, &(0x7f0000001940)=""/130, 0x82}, 0x400}, {{&(0x7f0000001a00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)=""/123, 0x7b}], 0x1}, 0x200000}, {{&(0x7f0000001b40)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001bc0)=""/188, 0xbc}, {&(0x7f0000001c80)=""/79, 0x4f}], 0x2, &(0x7f0000001d40)}, 0x4}, {{&(0x7f0000001d80)=@ipx, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001e00)=""/175, 0xaf}], 0x1, &(0x7f0000001f00)=""/4096, 0x1000}, 0x5}], 0x8, 0x10002, &(0x7f0000003140)={r6, r7+10000000}) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r8, 0x8008f512, &(0x7f0000003180)) 14:32:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 14:32:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x11000000}, 0x0) [ 1643.097803][T15820] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1643.097962][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1643.108911][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1643.188672][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1643.234848][T15829] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00'}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000001c0)={0x1, 0x6, [{0x3, 0x0, 0x4000000000000000}]}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304}, "81b8a9ce51889641", "3b5ee846c6955e5d50581d6284747bfae74f764be51ed9020000004e2d28d878", "bfd3f23c"}, 0x38) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000180)='@]\x00') sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x12000000}, 0x0) 14:32:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1643.388320][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1643.389738][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1643.413385][T15841] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1643.417699][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IOCTL_VMCI_VERSION2(r4, 0x7a7, &(0x7f0000000240)=0x10000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x4, 0x5, 0x4, 0x200, 0x81, 0x3, 0x9], 0x7, 0x80800, 0x0, 0xffffffffffffffff}) ioctl$VFIO_SET_IOMMU(r5, 0x3b66, 0x1) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x80, 0x208000) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) ioctl$SOUND_PCM_READ_BITS(r1, 0x80045005, &(0x7f0000000140)) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 1643.526625][T15853] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x25000000}, 0x0) 14:32:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000038000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f0000000000)="3e0f01ca650fae82009000000f01c90f439a02000000c744240000000000c7442402b46d0000c7442406000000000f011c2466b8e8000f00d00f2202b9800000c08f3235008000000f30660f38f8a90a0000003e0f07", 0xffffffffffffff25}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r5, 0x10f, 0x84, &(0x7f0000000240), &(0x7f00000001c0)=0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r3, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1646.133174][ C1] net_ratelimit: 2 callbacks suppressed [ 1646.133198][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1646.152562][T15862] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1646.197733][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1646.231278][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x48000000}, 0x0) 14:32:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$MEDIA_IOC_REQUEST_ALLOC(r2, 0x80047c05, &(0x7f0000000140)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1646.443609][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1646.464391][T15894] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1646.480240][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x4c000000}, 0x0) [ 1646.528218][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1646.572616][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1646.583181][T15904] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1646.704399][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 14:32:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = syz_mount_image$nfs4(&(0x7f0000004d40)='nfs4\x00', &(0x7f0000004d80)='./file0\x00', 0x0, 0x2, &(0x7f0000004f00)=[{&(0x7f0000004dc0)="6c6e90e0086bd80eeb594b0eb42dbabab811dab3176aeb480d4506ab8fd1995847e742dde3f2964d9089b5057cbceaf2e28989221be24a5410a6c14bb94d04b7b889e7e6bccd45738d9c953fd4a297ad3233e9e580b06a824a15562970205601bcd8fd45468a1f4f3409d349c0babf16ec25598505360cb53bfb65af15ce481c05f7267178676d53c2b8da31a446504ea62f6f1f19d0344e9d82e34f16c917690cf56a697b5cd84a06c5113fcadcfb5c56e72c4180b8b512422fab8ce31db8edde1635bc5e69b2f87cfc0f5e07c6a782e4f2c9c7f472d143cb954cf24b5102a6f9e58ede", 0xe4, 0x800}, {&(0x7f0000004ec0)="6a0409b22347518603e3bb8066c93175cdd5567256024f2e504c93eded6ec0c35770d67741a5c49b7b28df37b1a607f3dfa97098eba9bc0e", 0x38, 0xc162}], 0x1000000, &(0x7f0000004f40)={[{'.'}, {'tls\x00'}, {'tls\x00'}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#-^::'}}, {@subj_role={'subj_role', 0x3d, 'tls\x00'}}]}) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x25) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r4, 0x0, 0x4) r5 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000050c0)={0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000000180)={0x5c, 0x16, 0x20, 0x70bd2c, 0x25dfdbfd, "", [@generic="220d81a13196c609eb504a9bd5d2ea7a64e6bee30d07636ece7f3cb22dd5b04b6cf60414b8c83248497c830bb458773fb3df4f8f6880d087eeb6be3d4cacc5b325c443949ee6405fb2c891"]}, 0x5c}, {&(0x7f00000002c0)={0x1760, 0x25, 0x300, 0x70bd29, 0x25dfdbfd, "", [@nested={0x2a3, 0x1f, 0x0, 0x1, [@typed={0xb4, 0x23, 0x0, 0x0, @binary="2097034c413bef89f0b8bfa4b1b8449c45f7b0023d9562f7e45badcb532374f1fefeba29a2fed8cb8e39452047c9406edcb1ca8fe3d4ef97e0b8c2412f34bd60fcacbd1d7de547a885f7557cb959a67e33d50b5f3de50332a8bbca7d25956949c995af04993b4c485f921ba6349f60d6254a2cc3d61bfa4fa6a1785f0ad05adae7fbd0e94062a9c9089f34a053c564096357800d21182ace93ebd6567a158bcec281bf2ff8c323c75b15739f6236f0e0"}, @generic="b80edbd76d24242ce8ddd6f709ab1c71b2284f5b01326f177a7398ce43c68d5e640de29e14e21f1d2c05ea4095d9079d082a3c1ca2991b7dece79236a74e", @generic="dc91289fcf", @typed={0x8, 0x3f, 0x0, 0x0, @uid=0xee01}, @typed={0x14, 0x88, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, [], 0x1}}, @typed={0x8, 0x1d, 0x0, 0x0, @uid}, @typed={0x14, 0x72, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="b015da87c023eb267972ba17ced3c969797e192ca88749f2a31576c6190f7e6feca9be5a431425790a7150f9111dd8737a0276218aa5c0ba0714fdf4816dca58069329aafe11235e23fbcc1d1d49914d9a99549281a978cad1d9c45dbd0f3a05315e06e209f807af58cb4c7cd60cf0ad088e0e8c9d830dfb53b8319cccabe1e3cd676f9ee01b2b7e9224fb14ca650acf79afafa9b771ff5d8304eae8f748f847d51d45dc6af153e48873f0fb4afed996a35189e74680170e45ad2f2f95797f33fca70e85dc6fdc5f09cb9efdf3ac27f6b424ef5b646ef42feea9fda6e8b8ab77da460d67827720417ba4eb7e61c446dd4ade1f6dbf80f470a2bbca", @generic="7cf667e3f709199cde86b7939df6b7328d02ea3a06934764d4a36b15b7b2c7d1115ecb716274da73da6d679514748042b17d47b737f79f635beeba794e02c3a000ad6211e22fe3ccd4f4786711a9b19eeaaf9fae1821ff7acb7d04a12ea1297d877750cd41105dfecf0e331aa25a0cc2a9755179be"]}, @generic="2ff096a99ae30ca75735b005fc8ede55", @typed={0x8, 0x1f, 0x0, 0x0, @u32=0x8001}, @generic="d78622fa48429a800eec14e852c66ca82641bc6b9d795b4f0a5389d4684f3737bda8184fb22d61556aa444f7228326394095f0e524f66a860edff4d97c636c40b93a865ac1078e70468d115bf3943e3bc1bf49800482290a1c939d2d63362125b01e1ce2276f470d8e12c25141e8c24263836d45ae73ba20c57fe4e120e763dc4e34e961638d418c60398d4293e1698a30ea462a", @nested={0xfd, 0x37, 0x0, 0x1, [@generic="f979c95c8a8fe2bd7b3639724153d4beb80d0090fa2897262bd6eab771d61bf6f5789a9ac57a36d944eaa145efbeb8fd75f2e601f56afaea97a6f07223a9e1bc698a31951e10d301ad23293719602801b3820d5d0e1e78bf55c5b795f35222219a360ef2d6b6416e20f6df92ecaeb9a69c262521bb4edbc343f8d8beedadaf837be22b721a727f825357baac5421e52643286bb1a75e3fcbe46365f8fc29bf50d21a23635854c3d785b28c7118d4902ed14a89b4350a6abe006fa3101546dc8b8634099466c6e0ed1b5e011b111d5f811fff47c26e6c0fb5c7259d576f80707d3cc1977f155333502a", @typed={0x8, 0x27, 0x0, 0x0, @pid}, @typed={0x5, 0x65, 0x0, 0x0, @str='\x00'}]}, @nested={0x12fe, 0x2c, 0x0, 0x1, [@typed={0x14, 0x21, 0x0, 0x0, @ipv6=@loopback}, @generic="e84ed21e3d765d727adbab01f7c5c818f73792b0eba970554ca9bcd58fcab20ef200141e9c672cd6858b63fd1f22c7ec65d943b50f1f031242ad1e91001e348fbcd962787066e5ce975ecaba28ee6b131d9b2b42e7594ba73dd68fca7f67304b12f28fab8aa1ddeb14041f3db6e630633ceb58ada59eab4bbdd2b5449424d1952f812664b060da34aab7c8d3ceacd2f144f913d02f8fd61402967392df37b21c393a0d7bae65c0d267ef3b82cc48076b4f5cde642fe3f3ffd078d850e7401b0bfae8f8f04a3e4b88870fb9733871f1c708f9b920395e3ea7f38d70a8181ae733e3d4b6b8890fb36ff8b878ac1f5f7f0cfd98eac3582679b8", @generic="e51b24401837b07f4a6eb3e456a579f02ff6f3ac657693fbe05a53626f64e830754769ca79caee3d2baac98dd0acb6dd428824786da053843a614a47f7af1559066d557044594b00e0e0d3d556a0f4b7c1d75d62881342fee5dc737fc4d56da776420d4361ff42a71b192444296d9b1ba7d528e9a22da2a16096ddb57789beafa81fd6c0e4ed227df941647e1605b4795cd360d55b01d82dd078a3e4fae155700174e269026171e1", @generic="70970cda25d6b3d52b91aafafcc82cd77a5959dd54944ac2d7de538f25eb623ce2e358d8ae4f6a193a", @typed={0x8, 0x88, 0x0, 0x0, @ipv4=@multicast2}, @generic="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", @typed={0x14, 0x78, 0x0, 0x0, @ipv6=@remote}, @generic="02d80fab553294ddf514728d4dbfc0eeb0f62759c67fd87e9d25cf351e8276174cb6f7fff74f1dfc23dfc4bb43910824c6f87adf765f66da3812a40d52f12bf849acb986d362e47f6c81088fd0434130f827c725ce7400dd719a4dbeddaabcc4ef2722993cd8d30d50b6b1aaa872b22d2833b29be549b10a6aaf0a97ed39a322d17a045b12f5aa6a88758c2947dab97e01c91d30a86dd89777603498f0be31cf3570c41bde94104f46d5f5dd1f750bfd2433541561e6b268fd30da47ab7bbe36b0bbad29fdba49302986bb2d7e5d38505fed8082c683851e895fceece2ab3e8a8cf18e0d29", @typed={0x8, 0x5e, 0x0, 0x0, @fd=r2}, @typed={0x14, 0x83, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}]}, 0x1760}, {&(0x7f0000001a40)={0xd8, 0x40, 0x4, 0x70bd2a, 0x25dfdbfc, "", [@generic="3728e1ebdbe00d4c4c1010acc869ffaa72d4125027e3dcc3ee76e6066dcc02155a", @generic="3f7541cfe6b5105e6f138554a92e0e17cf1abd3bfb14107265a7fbd5ad517ab1ff19a669748f02514a8e797c557679fd81c0619d9745b580d1df4927477d2380762bf580b3ad1ae0865960e7050134c9e1b80300df5798b67fa734d89c6d0090276c2bb1ccf572d202565381b6887e245e939de2af30b0e69f77217156cb590f7dc5746b56bafeb01bdaef10b9342ea26c8fa2d1d69e300cfd8ec7212904d60af212ceba"]}, 0xd8}, {&(0x7f0000001c80)={0x13a8, 0x16, 0x800, 0x70bd2a, 0x25dfdbfc, "", [@nested={0x1112, 0x4e, 0x0, 0x1, [@typed={0x8, 0x77, 0x0, 0x0, @fd}, @generic="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", @generic="b1eae3f0059ad6cd05831f4f32ab14469568a91865c6dde87f2b229d41ebb8f3f69b62975223c9cb59bad534372f65fcd5783475b1965d305198f683977a6d27a7594a8367ffad55683f914be8d4095e8f467d50caf907e6e190c70db71f3a0a2ca6aa48613b0ea1835f8701b73812c81c48569b7241881420b776fa2b088e26f25a0400152406cad3e53d23cfad1dbda8295fd116e4e83b2b59ee640f990fd4db4a38253aa766d6bd7109ceac5a97b8", @generic="b187164d3e4a8766d41f7b4c1b74df30c3943a705ec65a40b282a857d08d00cdad329b39a93068d2eb1fc0493f56039ac36f7804d633eda1b6c2c9ac94a07ca2aa1874c264e9f207cb92d2fd4c4d", @typed={0x8, 0x7f, 0x0, 0x0, @u32=0xffff0c07}]}, @generic="9aa202caba55fdc81b7ff71b233acf7d3be50ac65dceac79cc06", @generic="7d2ab48221a3719f4878dd9df9f8db783cd1e3f801dbc2c9c0d0834a27c8142daaad107ecc439227bb437c7b3327994616559191c112b9a8fb33145a25397a42711dca1aaeee92adb325d80a5acc6b68dd1f7c3d023eb6b3316fc6c5a7f764a9882a441abaacc8f5f69e7fed341c72ec43e78f9efd6f3ed4bf08de6f5ed26ef46c7f45c4a078c3446bf68b4eaf1bde0f380310a30eb8960ee9", @nested={0xc, 0x31, 0x0, 0x1, [@typed={0x8, 0x56, 0x0, 0x0, @uid}]}, @typed={0x8, 0x7d, 0x0, 0x0, @str='^-!\x00'}, @typed={0x8, 0x79, 0x0, 0x0, @pid}, @typed={0x8, 0x8f, 0x0, 0x0, @uid}, @nested={0x1ab, 0x25, 0x0, 0x1, [@generic="ec6f25fed9b64f3ec3148874037a2c04ffa75491a6ba58520d4a2cfdf426f610a287afafa8dee286e424d397ed17739332fffef196938d1dd9a0f85209aec8ce2b40e849fab106e28f15651615b41ad493cc50122007708b7e0c7d33ecf4cca78994df7c3f82e49c5c56aaec5445f3a6eb96a6f19e63b073076e226a6070fc6015c8346311bb6eed1ee8e2c10c69217889680fd86ed0525e359d35e2bf0056517686b3e103929f", @typed={0x15, 0x70, 0x0, 0x0, @binary="43416b3c69fa1f77ddfde321604c8ebcac"}, @typed={0xe0, 0x6a, 0x0, 0x0, @binary="1edb166a8eec90c35d7801e9e68492d1c2b91df4cc831be2426ac2784331361d893c5a3839f3ef9317fdb9f6768780fc00408276b451c06cf4db2179919b2a5a548ddd6c233c82591022a115557defdd51e42d07a233055380d840d11507c07ba5b33f6abb4eb8488ab0f2a86284f128cb4c135af516068b60117f833bb64b8332d9c398f74c1fbe26c991c85c1183bed2aae0a5932b5e97ded1cb4ef62fd20357ec33ffa3bad2b41c6504a846ef0302c99f26e6f6370d4458d38bdbd3051f650a1c4b29becd0e52509dc5e01c1241d4e1e3d0a4cfbfaa5ad567ce4f"}, @typed={0x8, 0x8, 0x0, 0x0, @ipv4=@empty}]}]}, 0x13a8}, {&(0x7f0000003040)={0x1104, 0x3a, 0x2, 0x70bd25, 0x25dfdbfb, "", [@nested={0xd7, 0x24, 0x0, 0x1, [@typed={0x8, 0x1, 0x0, 0x0, @pid}, @typed={0xc, 0x10, 0x0, 0x0, @u64=0x9}, @generic="ced779645d83805bf8ee4ac2dcad898f7f89bd2794a09667461ce3f47f76446ddf9e270b9e8df8", @typed={0x5, 0x4e, 0x0, 0x0, @str='\x00'}, @generic="cb20c8ace74703c895c3109167d1ae130a8488adc043d5877e7af370a2fec272ae9c5e813a5106cbd73d87be7afe71", @typed={0x8, 0x79, 0x0, 0x0, @uid=0xee00}, @generic="9840389c955e639634c99e187d8ac52b1df9cbdde482ceed904a0494246fd4f0e16502dbf6d12c1667ad34e3c4d73035d8e1e5013b96f8e1f360c3b525cbf7fac42aebb414f2e81b704676a90bf4abb74c913dfbff20f823f8"]}, @nested={0x101b, 0x60, 0x0, 0x1, [@generic="0f6aee09abb23a291dc5f68aaf924076e73b3c5317730d1d007609742fabc07bd447bbcfbec38558f010c9c547482e2308210952ce0fe244be33c53312bb2e65db03ab0a2554d6e0416d815f2bf27170eac5bc82c41a10e0fdfc6be0b9038ccdf104462142741e5e37c565debd8b4991c35013dd8600d4767963ce39d470b2d8cf814e0f21fef407ac802350a683bbb48f6cec81a1a450a00489e4fb13d10399cb96e549573160cb27098be99a2186862fe34723942e8315263c9c7c0693300500c653e3fce0432dfab9722d5fed7990ffc04852c80e236e0f07a42fdc300e994fcd265f6670f87f135fc9d232a417f4b2ba972d6de11939038bd76c10011e85023f43ab7c357353496cdfa4baa7e8485af33b93d96b5d94ff8593462cdccca941cb73229d2ad175f1413fc920241f452ba4ff2860b807ca7b0aa16975430c11dd91255d9858f1dd2079075f3e695110ebd5d6f074fb14653a963a539f4b8836268bfb2cfc424e0c8ca6f151e09c4ec2457f57cc3da144b84bff298cac9504aeef46d16fd5744a965326ec5eb95d2dd96c7017b6553ee2e98622c5903045abc6531c6583759f60e24a6c00b651c33acc84b49e6678235128770f518fb230e4971796b4f6379fb30cc2e67f7203850e2476a3c41555aa7ca1af350a78f9362a014f79bfba9e1593d51338046e72f956f03f2e6a0906e90d5118549865689008ae297b59afabf7a74456fc57b45192cf0c164d44d8cfeb096434ae6fba9b8bd4feb008271e58b09b926de06b9482c2d4ad9ca18e29476822cc391c2df4dd130c3ab5721ba8345564bf170d489d68963c2f095f4f8dc39951c1f7e4169d06b3e2607adadf82a3ae25312b3021eae6dfc1707162df12a0095f4e83951a21fca1172209014f168fc3f934c814c571d5dbb90dcff899a07fb8b908ca195afe19e8c309dc187b3c0a2c1f23560882f083a2b5968c109f299e85805ddeb54dbab9de912bd0cbd6e1da978288eddcee0f1afcc2a8e82b733af60b162d6f912054e3b55ddda5c4b2e61449b22922d285b1fcb4ebba6e3bfb605eefb6975ff7341840769322862577c23b66b4355ba33e3387ef173792719fedde2f0ccd81f3795e488298d0d3693040b91319041da7dccea8141cd4bff95aef2d7c1faa99111047c5905c247bc300f5993fe8362b03ef5f99f507bff54c9f888a4d8e674bef79599f871b3f6f4d0acbc236ed9a2dd689d045eefc3c53b66db9ed004224b7be774dc6b289023ce5847c3d717f508fc25e3b451be642c70829b0ce978e753f6a7d3bb5e1ec979ff45632f87195d981d27898686af8afdfb208ef381f925ab9915b223b0bd8dc21873d9b6bec920c04d0072e5607a0d7aa289714821f4fcd8817699aa41faab1efb99b49af40a26a545befd9b2108eca4dbd7a0725f632394ce863b5f6a87b3fd7d3bf7100bfd100045fae86dc7a4217d6258befe58d8e2b45ac32f1636c862fce4667d68d923bcfb401667ce356a60f73987f85eb36b4c9392820d605d3166b4d7fb3f905c05132e39e8083411c809c52e5cc07dea791018ac46957f0a1a3313b4ffb4a7f3192e564a2a4cbec6e94318cb325dab7cc9a21499c91245c1aedad447bd5c5698993af052252f9109b5f26a3ca0ecbe55f3db96dbdb73c4e52569bb4e3b15d053356a5828708e6d1f211f6f6ee8219cc4a328cbe98707e4c4bcb7389be34ab9d5e50bd8bdb7b4202fd7c493e019adda5cb3a15a21ef103cf6d2aaad8fa3e27d77c5417e14e893f755e2c7aaa89591b0268486c83ae5a08c176196be2c8fa853445198841ced8e657ac3e074f76fd5df6801db0b6511967646ea513e3ad06668667167c0833bc4ced25146f5a41815de2a3bfaa60d456493240344cd3267e93cf9e5fd79cbed91c8bf08d84a649df12e8bb58b02a18b7c0f9d43e07c1caa7086d93dceca4c9f7f04707d936a2da3dd9798cff13d9dd01ec4d853f679bbdf4dfedd1d0b8c9266a393978eeada69f6b024188342dc1166a18896cc0dbe9a4c0a80bce9569bc5c1d503156124be8546b3cab949aa294fce1a76eed31804301ba4450b9e55f634768b56d48881f29f67822ace083087b022942f48bffb82ec37dd74f251bcad8015a371eb5b0f1b202aa0dbe65f193825e893f2162f5cb6f00bb528c9742ca3ffb47c373ba26f91eeab833a4c69fd31a9df114f23088608f8c12694a898d2181bd7f6f6f0545503b7ac18985d5349e9472ce606b98d60428f68b319d840d140650ae095ac10a820a4e2ea48901d7abbfff74d0c5072f645765bae0d1b9bb5c10d89e943a3bec142c4db98c95fcbe2299d7bb5b5cce36a77d09b1ca6bb55cb3153f5ae443f494b2ff1b43df15a29b09e0e9fc6f0c4fe33c2c599970c393bb17cc4199ab340a0912c0b5ab9f4f9ccf202d25b40df2d5874d9ae39feb6e3d7aff4438c7cd15021fbd3369db7211ebdb2efcf46bc5d05bf6cd9afebce1ab3f90892acefb39de54b1a3833d8e62378cde89888f3da88a755165d56460af40150b741b8a455a313258ebbaf11a889cbf240162af7a940e3e2dafb852965591f5832aae95dff3116f79c7612a69b834859e303f72c04edd9aaf1d4a7aa19905d9ed15ec1db143bf9813818d81118d9ae6f190c36058707f742ced4b04d462e9a38a197a98e6cc7d040f7fdb55c3b161ee6a71ae29400302e04fcfc233b43ff3ab79c7555524a881713d91e9fe66936d2b5fbd886b898c25784168d97eae127e747937c8ba06886099d38a850c6b812b1b43e530830293807211cbdd67bd18322c8873e92516fb15cb0b2927d7bd19786d5153dd46251552546aba7b2748c843e1a3a555672ea53dbe099c6c0501fe6adf6c519f95e685a69e2f9a4743e59a31ccf69ae5a5e06fff9cc039b940a00b44dbb79f71fc31b34862b29cec74366a41811f8848cb65e8dd965e56a63075423514fdfe2cd7d8d47e1127a88adf01b8dd4f4f77319aaadf048d8c621ff4885ffef76d6f74765cd3a5b463828148d49d25ddb1308c0b24cc2aa56d4ad8033779288876a4b66bacd9fc05649e0bedbe0d3aef0feb2e2e99b00948308a4a83bd391527490d3a23b5904158756587753004187b40650d3774e34e2ffa4bb707233814552039373c8acb8f90fe2bef3fec3d3be77753becf183ccf6c873e1896f45315f14e214ba58173c94c738833d9a129ced4216693372a690ae7076ad6be075d6adfeb848e52d63af421fa35f60576c49125f7389339401b8fafb1f050f2e3343700ec24c099b2d24487e95b1c592c0f48bedbfcd839ca47b66720e605c7e647551db01b7cb4913544d363f85563112082c59d28cc2811b72830b5aae519423945bbd8d8076f43355455f261c67fa4c975096c88f9bad08e06fea01e739bd1705d4ade14df079f320b5755259d6e58c96eabb3253a965fbe4876cdc6c875a5f292d91f4f5eee7d764bb8657a05eb1cc313023d362beb67742854d902e79903caeb090b03c666a7f4577a1d454f8b6a0cdb9f6e9bd11d0907cf9e0fda81b3f04e2ba558267dfed31b1d1e3b4972ccd6e7fe8fb9a4776f4d02e407de5c87996c0f552e92a9d21dc44fe14b4fe1e985d185d2e316b43e95da37d4c8ac7f426287a1dfd50a28bc95ccc18ea17b8e570e0b1560c074d64ad695c89e50b01133da73a47c9912b842fd4f1c9c21229b0e4e902a29f9c20582aa59cff34d70d0fe56617c00ee173dbeb3adb85557cbfceecab373053c56be7de7de42d2148eaca2678be8a42ca9dd852a6d19f0b89a8c92aa0613f27cd326df44ef7dc869aefc5512b18edd6caadffd136adecf6f1e57a5ca2e8342e25150e909ce8103d71a856f8d4b1bba8171b2ac88bf0d298cd65b4bbb3728a79c3a980eea32d29ac5c5f54887049395524325077ef6050d343d1ac73fc02b3d3a90875416afdc634da985cd2f06eb0f489cf3c82d008f5a596c66d1b79e858a95939fe04700127fdc9706e90cbde5dbf31d4df1c86169c7d3f49bbf2f9fc2885729c9f7d4d29c2d15e093254c612107afe2bf7bcb495f1411d8e3ead40441799effa5ef6c675903a38bf85a16acfa09157d515759e54ef0ee8267d6741af3a1f727ab76fece3d6707471cefd2ffea73f260165830b923c9bc70ab05ce77d3a77f2981164f712480119fa05479f15c30a3984fdb717933502c62035f673334547b9577070eca920e841a0370e803733e1bba58bf2c3e22d6f639e1051456c025270a6b6c7d16c50bc9aa4af71c2c947386b0199fae1d3d2af0ea6364a150733e48787ebb663c3e7bdafb058f6d3153055c8aee76d18dfa94c8c8ae71e9f21aee4d7ec7df30a129e3335c54ffd4828a8e96985a05883b588d9c21e79253189984498eee6afad03007d6ad754fb07dcb67e17da7c7caefefba695f5260fb335fb0c054592fc9cd2d66f36e5f7d57e4596f0b48d2c2b4bc48a55385747d2b9b7ede20c9bbe63290b9169d6dc5c95d16fac8ac1fe34043c05cdfe2959f2bfbe85fabe7c8aaeceef857737acda3867873f36db9386b7f656c0e45a3acadeee4a41b55f3a91afa35406d80c0fc6059c0e333226cb8532ab5c620eada8109ce245b09af94d9383f9e6f103765a2db4990fdfbedce048f96da96077ea6563df4fd2f1f1146ac905e8e2be5a6d8ec407616302ee0e928759225440cae9931a1d0bdf0733656ad74f7445291d2af4e383cbd05ad9b60ff2b509e3dcbb5ba8ea71036fd2a26c92ea744375bd61e53926a6e97e6aeecc86f956c61ffdd6544f174b40fdcbb06f768d1bd77a6533d63ef2c8267e743a84cb31c862f592787d3593f171cdc6fee03aa2919c3c63b243c596e803b117672fb6dba84479b588c0a382df4691f9e52f27517b813e0ed72bf76baeb8c1cef0f8da74475364d0d694b5eb8788abaec926d5f28d8e7bf70b1d09b07c49adfae30d2440074e083315b0327d2d574b3852b4a172f52f9f22e2732f671dbcd0fcffb10ab3268f9c139cca711a7aac064a47b16501bdf08fe17181d46aab6e65960c2a9968801d8c17b1108dc4ba7a94a84a9756030835cb85290c99da289d4312f8ef1ae6da1366629870b91534c937d2ad4a5cb6ca866634994600585c43dca71b0d7e3cd55617585c609b6f60bbf0a25f764472afca9a07bb7604a81e2e663e11790e6dea24b713b1b051261167581d5912614934c28583c5be42758149aa66b05875db0b1541c54d84623ecc299d596c001ead8b55478a32f398088de71348780cf993de1a8029a57d211d7b61fecccb063e6d60e4264b300d7abdc105ce329f8da3f22dc942f64c3374519335f19bdcefa8e2a3305999acec9c8f130eb6f7c314a2d57731256d111bcd2226cc32dbab6c4ba9820605135b39a4a97201db4d15db381d0814b1644bac4cb358f5b02af536bc491bd4246423c0e69350c8bdd6cf162c98be54a7ca32d12d26cc6e5dde1c46829ed0b10469d8f29e6dae3498f6bf9d93561463f6de2f0ea9efa83f35cdbb75d68415b81471c5eb3492d0c3bedeb0e1fd9d95040b54e15e9011b3ed35a9937c404de22f5dc43ea6a3d4f1e1b221d36905164318af30ef7e98b388e12c4cd34332fa2e80d2b3aa76ab09283a848c15e30965739b431dde820ae3597ba2c3a7fe8a156b488fb3ffe46ff943e9d63941964806c06676aec865917c3f8edccd22da20358e5a2d054a11da5c65444d68bb93bb41272ce5d26a507f7bd5b4f8ac16ea762e66b5300c9908877beae88b33c475e0930ce6d6eba801252c3", @typed={0x8, 0x23, 0x0, 0x0, @fd}, @typed={0x4, 0x62}, @typed={0x4, 0x2c}, @generic="5dc181887e3102"]}]}, 0x1104}, {&(0x7f00000041c0)={0x48, 0x10, 0x400, 0x70bd28, 0x25dfdbfc, "", [@typed={0x8, 0x76, 0x0, 0x0, @pid}, @generic="fa6f9f00342766312ccbcde55af3165daf0dbe13d7e9da465717ede4214281eb02891292d53633bb73bc0728c6"]}, 0x48}], 0x6, &(0x7f0000004fc0)=[@rights={{0x24, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, r1, r2]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r1]}}, @rights={{0x38, 0x1, 0x1, [r0, r2, r1, r1, 0xffffffffffffffff, r2, r1, r2, r0, r3]}}, @cred={{0x1c, 0x1, 0x2, {r4, r6}}}], 0xc8, 0x4}, 0x0) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1649.159993][T15917] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1649.194426][T15920] nfs4: Unknown parameter '.' 14:32:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x68000000}, 0x0) 14:32:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f0000000240)={0x2, 0x5, 0x7, 0x5, 0x5, 0x9, 0x2e, 0x5, 0xe9, 0x81, 0x20, "7044bf195f20d0e6e4325382b104dc253d73cff99ee7ebf21892e4b69745d171"}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) move_pages(0xffffffffffffffff, 0x7, &(0x7f0000000180)=[&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ff6000/0x2000)=nil], &(0x7f00000001c0)=[0x0, 0x6, 0x4], &(0x7f0000000200)=[0x0], 0x2) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000140)={0x7e, 0x32314247, 0x2, @discrete={0x2, 0x4}}) r3 = dup(0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r1 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000140)=@generic={0x1, 0x4, 0x7fff}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x6c000000}, 0x0) [ 1649.499617][T15937] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1649.584135][T15949] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:32:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x74000000}, 0x0) 14:32:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x28, 0x0, 0xc) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 14:32:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1652.197087][T15957] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1652.212463][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) [ 1652.259977][T15964] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1652.270451][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:32:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1652.322232][T15969] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:32:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:58 executing program 5: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockname(r1, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f00000001c0)=0x80) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f0000000200)={0x3, 0xfb}) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:32:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:32:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1652.514880][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1652.538568][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:33:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xa00c0000}, 0x0) 14:33:01 executing program 5: ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000140)={0x80000000, 0x1000}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x82002, 0x0) write$dsp(r1, &(0x7f0000003180)="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", 0x20004180) ioctl$SNDCTL_DSP_SETFMT(r1, 0x40045010, &(0x7f0000000180)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x400002) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1655.245992][T15999] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) 14:33:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000140)=0x3f63) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x402c0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x3, 0x3, 0x1000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x44, r5, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "cf"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r5, 0x8, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x300000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8881}, 0x8000) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1655.324831][T16007] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1655.392924][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1655.429287][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xefffffff}, 0x0) [ 1655.534489][T16022] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:33:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000140)={0x2, 0xfffffffffffffffd, @start={0x0, 0x1, "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", "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"}, [0x7, 0x400, 0x7ff, 0xa88, 0x7f, 0x6, 0x602, 0x3f, 0x7, 0x2, 0x3, 0xb0c642, 0x7, 0x4, 0x3, 0x8c, 0x10001, 0xb3, 0x40, 0x843, 0x0, 0x6791, 0x3f, 0x9, 0xff, 0x80, 0x5, 0x5, 0x3, 0x7fffffff, 0x1, 0x48a, 0xfffffffffffffff7, 0x45e, 0xcdbf, 0x1, 0x100000001, 0x2, 0x80000001, 0x2, 0xfff, 0x9c47, 0x8001, 0x3, 0x3, 0x1000000000, 0x1, 0x1, 0x8000, 0x1, 0xd263799, 0x5, 0x2, 0x9, 0x7, 0x12000000000000, 0x4, 0x7, 0x9f1d, 0x1, 0x2, 0x8, 0x401, 0x100000001]}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000b80)=[@in6={0xa, 0x4e20, 0x81, @loopback, 0x8000}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e23, 0x5194, @private1, 0x1}, @in6={0xa, 0x4e24, 0x7, @mcast1, 0x3}], 0x64) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 14:33:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1658.295936][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1658.296666][T16039] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 1658.414118][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1658.431590][T16052] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 1658.558587][T16060] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1658.564227][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1658.630079][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:33:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xffffffef}, 0x0) 14:33:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) dup(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$HIDIOCGRAWNAME(r2, 0x80404804, &(0x7f0000000140)) 14:33:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1661.352023][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1661.374223][T16083] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1661.389897][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/adsp1\x00', 0x2800, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 1661.468847][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1661.502607][T16092] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x2) [ 1661.613370][T16101] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1661.623524][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:33:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x3) 14:33:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000140)={0xa, 0x20004e22, 0x0, @ipv4={[], [], @loopback}, 0x800000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229c", 0x64}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x4) 14:33:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCRSGCAUSE(r3, 0x89e0, &(0x7f0000000140)) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10000, 0x0) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f00000001c0)="23a5377a7973c233467ae1209f4e07d06aaba693bd76ae1f7dc451d9789824fc170bb47d26291171367edcc027fbfcf6aa356bbca5c119366c37a4f567101f1c1ecf0e8e27b35ce7fffa944031") sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, 0x0, 0x8, 0x70bd28, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x8}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x2000c000) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendto$inet6(r6, &(0x7f0000000080)="39a1f8", 0x3, 0x240040d0, 0x0, 0x0) 14:33:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1664.466619][T16127] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1664.477598][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1664.508194][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x5) 14:33:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x1008) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @mcast1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = syz_open_dev$mouse(&(0x7f0000001540)='/dev/input/mouse#\x00', 0x4, 0x2) r4 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$SNDCTL_SEQ_OUTOFBAND(r1, 0x40085112, &(0x7f0000000140)=@t={0x85, 0x4, 0x4, 0x8, @generic=0x41bb}) setreuid(0x0, r5) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001580)={{{@in=@empty, @in=@empty, 0x4e21, 0x3, 0x4e24, 0x0, 0x2, 0x0, 0xa0, 0x32, 0x0, r5}, {0x9fb7, 0x3ff, 0x8001, 0xa2, 0x9, 0x8, 0x32, 0x3}, {0x7e, 0x2, 0x7, 0x7e65}, 0x0, 0x6e6bb0, 0x3, 0x0, 0x3, 0x2}, {{@in6=@private0, 0x4d5, 0xff}, 0x2, @in6=@mcast1, 0x3502, 0x3, 0x0, 0xff, 0x100, 0x9, 0x1}}, 0xe8) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000180)={0x2, 'macvlan1\x00', {0xffff3a86}, 0x7}) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000001c0)=[r7], 0x1) 14:33:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:33:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept4$inet6(r1, 0x0, &(0x7f0000000140), 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @remote}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_RESET_OWNER(r4, 0xaf02, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6) 14:33:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229c", 0x64}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) listen(r3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) socket$inet_udp(0x2, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1667.449890][T16157] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x7) 14:33:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x8) [ 1667.684766][T16177] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a555e", 0xc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:33:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap$dsp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x11, r3, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r4 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x80000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="5301000000000072ad000000", @ANYRES16=0x0, @ANYBLOB="00082cbd7000ffdbdf2501000000000000000b000000000c001473797a3000000000"], 0x28}}, 0x40000) 14:33:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x9) 14:33:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229c", 0x64}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xa) [ 1670.487340][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1670.547677][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1670.584671][T16201] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x88000, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xb) 14:33:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) inotify_init() 14:33:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xc) 14:33:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a3120", 0x96}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1673.515808][T16223] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1673.525629][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1673.551507][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xd) 14:33:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000038000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f0000000000)="3e0f01ca650fae82009000000f01c90f439a02000000c744240000000000c7442402b46d0000c7442406000000000f011c2466b8e8000f00d00f2202b9800000c08f3235008000000f30660f38f8a90a0000003e0f07", 0xffffffffffffff25}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r5, 0x10f, 0x84, &(0x7f0000000240), &(0x7f00000001c0)=0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r3, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1673.620027][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x10, r4, 0x180000000) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0xa91, @mcast2, 0xfffffffd}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) ioctl$SIOCPNGETOBJECT(r1, 0x89e0, &(0x7f0000000140)=0x83c) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000180)=0x3, 0x4) 14:33:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xe) 14:33:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1673.707262][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1673.827816][T16249] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a3120", 0x96}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x10000000) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xf) 14:33:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = signalfd(r1, &(0x7f0000000140)={[0x3]}, 0x8) write$P9_RREAD(r2, &(0x7f0000000180)={0xd4, 0x75, 0x1, {0xc9, "edc45e2c94539e9d228c01c311ec8fa3d406a02b0246bca4b3b147afe5c42880d84c9f14398f8933998e1172d593bb61e94ff94b521060d64a9c758f599f920962d74e1d079fb51139ef443cfac31dd204740e3f9b714c3f772cc6f4a410583f7917fe46282268da6cc38dd4b41945564654c1d650a278aea11c4bcb3373ff4ff841239b6da19c358c37dce6ff1965f893f2a4f5b26779e660ab26c71dc5cdb187f75d77c5ed093fdf6c2fcf089869390d48c3326ddc87feabcd5e2c8ab8fef7829218265c9ad2dc81"}}, 0xd4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1676.603183][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1676.640811][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x10) 14:33:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x9, 0x101042) sendto$inet6(r2, 0x0, 0x0, 0x4000804, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @loopback, 0x101}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x11) [ 1676.798304][T16285] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a3120", 0x96}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$inet_mreqsrc(r1, 0x0, 0xd, &(0x7f0000000100)={@multicast1, @private, @private}, &(0x7f0000000180)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x303}, "60ef93dee3435b57", "66acadbb1915761f4a1e09b8a5da65f3", "5654dc56", "e4a400d23d15aa6c"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket(0x0, 0x5, 0x4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f00000001c0)) 14:33:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x12) 14:33:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1679.581985][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1679.596989][T16305] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x25) 14:33:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e3", 0x8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x48) 14:33:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1679.842239][T16322] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x4c) [ 1679.967353][T16333] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51", 0xaf}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)=ANY=[@ANYBLOB="3fa70000000000000a004e24000000eefe800000000000000000000000000015130000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000020000000a004e2200000000fc00000000000000000000000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000000000000000000000000000000000000008000"/400], 0x190) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setpipe(r5, 0x407, 0x3) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r3, 0xc008551b, &(0x7f0000000300)=ANY=[@ANYBLOB="f306a2a43e080000030000000104000001000000"]) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x60) 14:33:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1682.628901][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1682.640695][T16342] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x68) [ 1682.684374][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1682.723944][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1682.764963][T16353] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e3", 0x8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) r3 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r2, r4, r5) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) exit_group(0x4) 14:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6c) 14:33:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1682.888174][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1682.900115][T16364] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1682.910183][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1682.984456][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51", 0xaf}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x74) 14:33:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000140)={0x8008, 0x0, {0x56, 0x3, 0x7fff, {0x37, 0x2}, {0x5, 0x401}, @rumble={0x7, 0x8}}, {0x55, 0x3f, 0x3, {0x5, 0x3}, {0xf0d4, 0xfffe}, @ramp={0xc, 0x32, {0x624, 0x55e, 0xbf, 0x7fff}}}}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x7a) [ 1685.638757][T16382] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1685.654258][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1685.666729][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1685.697715][T16388] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1685.733002][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1685.761739][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e3", 0x8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x104) 14:33:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6896fa08ee873a25) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x3f, @remote, 0x8}}, 0x5, 0x4, 0x3, 0x800, 0x41, 0x80}, 0x9c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r4 = pidfd_getfd(r1, r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) [ 1685.903904][T16400] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x300) [ 1686.010670][T16413] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51", 0xaf}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000140)={0x0, 0x4, [], [@jumbo={0xc2, 0x4, 0x8}, @jumbo={0xc2, 0x4, 0x5}, @hao={0xc9, 0x10, @ipv4={[], [], @multicast1}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}, 0x30) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r2, &(0x7f0000000080)="39a1f8", 0x3, 0x40, 0x0, 0x0) 14:33:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x500) [ 1688.686192][ C1] net_ratelimit: 3 callbacks suppressed [ 1688.686211][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1688.705255][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1688.717322][T16425] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1688.733059][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) r2 = socket$caif_seqpacket(0x25, 0x5, 0x2) dup(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) pread64(r3, &(0x7f0000000140)=""/106, 0x6a, 0x8) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade9151fc95340020", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1688.793487][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1688.836673][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f", 0x9}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x600) 14:33:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0xc4802, 0x0) ioctl$SOUND_PCM_READ_BITS(r3, 0x80045005, &(0x7f0000000200)) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1688.888700][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @broadcast}, {0x1, @random="c9faacba06b7"}, 0x28, {0x2, 0x4e22, @remote}, 'wg0\x00'}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f00000001c0)={0xc0, 0x6, 0x2, 0x1}) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1688.965499][T16442] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1688.980236][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1689.055676][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1689.095717][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x700) 14:33:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:37 executing program 5: r0 = syz_mount_image$tmpfs(&(0x7f0000000140)='tmpfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x9, &(0x7f00000034c0)=[{&(0x7f00000001c0)="74aa6e2650e2708adc40578565d6acdc227efabb808a13f4ac04ef21ec314025f73f9e72d338067be69e076f4f528bfc443b5a63cb17215329206b1548af4e75cf74da7fee6fb1b9a0feb90f13b1e75391a6d7cfe5fae8ea0f0f06827da5eec10417c2c8a1ce015811af1fbdef802eff80a43fe13b4eeac733a2f20213730e4a362d8b148cf3d1712b27a6045c993092a812ada4875ce6ae6ed2f81ac76f653790a5175a0ed5f56af282f0e9c3a794618e57d93702", 0xb5, 0x7}, {&(0x7f0000000280)="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", 0x1000, 0xfffffffffffffffe}, {&(0x7f0000001280)="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", 0x1000, 0x5}, {&(0x7f0000002280)="f9b56e93df62d77ef17c129046f7988c11759263c97762f6741dd8853bf7bd7d529ed132dcb583dccbf2d1593a884e9490b5005e5066249c98b6c366aff06c988657ff076125755dc1aa8580241abf1d0603cc3839af123db4ab9af7f214b5de38b75839e12a108fd99c63de8f6e2bd6f924db898397342656010a224222e33ad241d7", 0x83, 0x5}, {&(0x7f0000002340)="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", 0x1000, 0x8000}, {&(0x7f0000003340)="ed2289703ae72f699dabf7be79ba5351dd4558", 0x13, 0x1}, {&(0x7f0000003380)="9c1b3770a0bae78f73f0b31c1f79f352af314b0c95cf6f7243590358bed0344010c961a963c1606425e9f04493cdda06d930f7d3c9ed3bd829ef98192bb3be8497a96612d18deae316cc3de16d54b7a80746541566bfd4728ee127104605fadb4767db923094172325241824f610aa045187cb24b60dbff829c7", 0x7a, 0x200}, {&(0x7f0000003400)="b7115952e5a0cb50adfce3d7f82a2fcc7d9d43cb196daa4d0f48128fcc16d123020fc3fcf2b05f7262764565bf19d1776513bbc155b9d1be3dd951ee96d2dc14a1236a65e4767ca9b8901e4b979d407d84f57e4bf8af5e2e47fe4b4bf99f816e49bced02720f0f5586e8393323fed34b8841f657c939de2e22fc6a650822e74c", 0x80, 0x1}, {&(0x7f0000003480)="beda21952fbf941cfeb885947e792c34219c7faa606d66cd327e5212fca250d2e2e7cfbbc84ff5d6f04cb55b5dcb4b2b82ae265679bc656c689ff3f4", 0x3c, 0x2}], 0x4020, &(0x7f00000035c0)={[{@gid={'gid'}}, {@size={'size', 0x3d, [0x35]}}, {@huge_always='huge=always'}, {@huge_within_size='huge=within_size'}, {@huge_advise='huge=advise'}, {@huge_within_size='huge=within_size'}], [{@obj_type={'obj_type', 0x3d, '\x00'}}, {@euid_lt={'euid<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '*{$$.#%**'}}, {@obj_role={'obj_role', 0x3d, '!{)!/&\\\'(+\x1c'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfsroot={'smackfsroot', 0x3d, 'tls\x00'}}]}) linkat(r0, &(0x7f0000003700)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000003740)='./file0\x00', 0x1800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x900) [ 1691.699360][T16461] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1691.721641][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1691.776519][T16471] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f", 0x9}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xa00) 14:33:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x101200, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180)}}, 0x18) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/timer_list\x00', 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x4000}, 0x408d1) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1692.022929][T16488] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xb00) [ 1692.125184][T16496] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000180)={0x7, 0x0, {0x0}, {}, 0x3, 0x5}) wait4(r3, &(0x7f00000001c0), 0x2, &(0x7f0000000200)) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000140)=0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x26004005, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xc00) [ 1694.759091][ C0] net_ratelimit: 6 callbacks suppressed [ 1694.759101][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1694.802937][T16509] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1694.803425][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xca0) [ 1694.882317][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1694.896475][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1694.939448][T16518] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f", 0x9}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000140)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x80) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xd00) [ 1695.052792][T16524] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1695.063264][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1695.074960][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xe00) [ 1695.101792][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1695.167031][T16534] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffffffc) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "5d851fe796938f00", "a501080000cf41fd552134ef423100", "ce5d06b5", "bf9f4a0400975f33"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xec0) 14:33:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xf00) [ 1697.832756][T16546] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1697.832782][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x281, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f00000001c0)={0x2, 0x1, {0x57, 0x8, 0x5, {0x400, 0x2}, {0x6, 0x3}, @period={0x59, 0xf313, 0x6, 0x2, 0x7ff, {0x0, 0x5, 0x800}, 0x7, &(0x7f0000000180)=[0x3f, 0x2, 0x2, 0x80, 0x4, 0x0, 0x401]}}, {0x54, 0x9, 0x800, {0xfff, 0x6}, {0x3, 0x200}, @cond=[{0x0, 0x7ff, 0x2, 0xc4, 0x80}, {0x800, 0x3ba, 0x1000, 0x2, 0xfff7, 0x2000}]}}) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1697.933019][T16554] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1697.935765][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x1100) 14:33:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r2 = syz_open_dev$binderN(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x2) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) tee(r2, r3, 0x8, 0x1) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1698.092365][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1698.104454][T16564] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x1200) [ 1698.194965][T16572] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000", 0xc2}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, [], 0x1}, 0x80000000}, 0xffffffffffffff2c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x4e1e, 0x2, @loopback, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x2000) 14:33:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x2500) 14:33:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1700.844795][T16579] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1700.858466][ C0] net_ratelimit: 2 callbacks suppressed [ 1700.858483][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1700.930351][T16587] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1700.975023][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @private1}, 0x1c) listen(r1, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0xff, &(0x7f0000000140)=""/76) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:33:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x4800) 14:33:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1701.109737][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1701.133747][T16600] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) recvfrom(r2, &(0x7f0000000100)=""/60, 0x3c, 0x2140, &(0x7f0000000180)=@nfc_llcp={0x27, 0x1, 0x0, 0x5, 0x1, 0x0, "f6c09e08f6d0e4a4d9552a3144c2718a3888889d8b46d1683747341d329a7264e5c346d281d4888d096a396f61ef7efb415a2ad777deda19a2d5d5b08c3e7c", 0x26}, 0x80) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "080001803000c400", "442065238929350ade91900b51fc9534", '\x00', "00000000fdff00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1701.216323][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1701.240475][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000", 0xc2}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x4c00) 14:33:50 executing program 5: r0 = dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="4d6176dd99a9f31001ef35b6e55221115084dc1df7568628092e99116a7f92a05ac49f91a383955675aa73c07820b10f5da8597b61b1a03e", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x83, &(0x7f00000000c0)=@assoc_value={r3}, 0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r3, 0x4, 0x4, 0xe7, 0xffff, 0x9}, 0x14) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000140)={0x10001, 0x2}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6000) [ 1703.900459][T16617] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1703.913487][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1703.950389][T16623] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1703.993991][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6800) 14:33:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6c00) [ 1704.128057][T16634] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1704.131074][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1704.208959][T16640] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1704.286373][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000", 0xc2}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x7400) 14:33:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x10200, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r4, 0x800, 0x70bd2d, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x40) listen(r2, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000001c0)={0xf000000, 0x6d2, 0x3, r2, 0x0, &(0x7f0000000180)={0x990967, 0x1, [], @p_u32=&(0x7f0000000140)=0x8001}}) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 14:33:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1706.927556][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1706.951398][T16658] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x7a00) [ 1707.053755][T16667] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1707.064789][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x3, 0x90100) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x480840, 0x0) sendto$inet6(r6, &(0x7f0000000140)="39a1f81d0b1b1f94a4b2959a7a5a6cc0109d06e6b29fb7c0a5d84a4adbadd01e2577acc24031a4c5520035499aee937da6a4993f4806c280d8263ce1d04cacba0604a7534f2d372224f66487a91fdc95b80435a2331a3b1ed7000d978206950dfaa5d463a7b87fb90a031d6e010ea39b9119bf59959575d64abe94a8e3160e9e8e73701ac452086c7af89200dd3a719ec96b45fe060943f0cf5e82cc73f3b62a134ebea55b6ea9db86659a04b4f31cec2079380a597194854eef4453807959eced5c281ad5895983342828d919b3e96b4c09f76dab566064de471a4647ef21a9000000000066000000000000000000", 0xfffffffffffffe57, 0x0, 0x0, 0x0) 14:33:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xa00c) 14:33:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1707.171644][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1707.178245][T16679] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1707.191165][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1707.205269][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1707.309699][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xc00e) 14:33:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r1, 0xc0385720, &(0x7f0000000140)) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 14:33:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 14:33:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$SOUND_PCM_READ_RATE(r1, 0x80045002, &(0x7f0000000180)) dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x442002, 0x0) ioctl$MON_IOCG_STATS(r4, 0x80089203, &(0x7f0000000200)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1709.979601][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1709.987484][T16697] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x34000) [ 1710.084119][T16704] Unknown ioctl 35123 [ 1710.093808][T16707] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1710.098365][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1710.116234][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x400300) 14:33:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 1710.192198][T16711] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1710.208432][T16714] Unknown ioctl 35123 [ 1710.212951][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x1000000) 14:33:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 1710.355469][T16724] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:33:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000040)) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) 14:33:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x2000000) 14:33:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x40, 0x0, 0x0) [ 1713.008002][ C0] net_ratelimit: 2 callbacks suppressed [ 1713.008011][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1713.043015][T16736] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1713.109738][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:33:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x4e26, 0x0, @loopback}, 0x1c) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x1, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:33:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x3000000) 14:33:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:33:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) [ 1713.260624][T16758] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1713.265801][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @private0}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) socket$xdp(0x2c, 0x3, 0x0) 14:34:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x4000000) 14:34:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 14:34:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4244000c}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYRESHEX=r1, @ANYRES16=0x0, @ANYBLOB="0000001400020020017f0000000000000000000000000108000400e00000010800050064010100140002c179d00bfc5b705eef53e7e0a6faf6003501000000000006000000000000000108000500ac1414aa75657468305f766c611de7ba7a44a3daab000400ffffffff"], 0x70}, 0x1, 0x0, 0x0, 0x20008000}, 0xc0) 14:34:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x4010000) [ 1716.051176][T16768] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1716.063708][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1716.109386][T16778] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1716.120656][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1716.176232][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1", 0x2, 0x40, 0x0, 0x0) 14:34:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x5000000) 14:34:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x8480, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000180)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6000000) [ 1716.269595][T16789] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1716.270601][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1716.282291][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1716.343299][T16796] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1716.354028][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/199, 0xc7}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0x3, 0x0, 0x0, 0x0) 14:34:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x7000000) 14:34:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.apparmor\x00', &(0x7f00000001c0), 0x0) 14:34:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x8000000) [ 1719.086530][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1719.090390][T16806] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1719.110560][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0x3, 0x0, 0x0, 0x0) [ 1719.165903][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1719.190775][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1719.204024][T16816] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0x3, 0x0, 0x0, 0x0) 14:34:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x9000000) 14:34:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmstat\x00', 0x0, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000180)={0x0, 0x100000001, 0x8000, 0xfb8, 0x5, 0x62}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 14:34:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xa000000) [ 1719.321132][T16825] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1719.324975][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1719.359325][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1719.402841][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1719.419621][T16832] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/199, 0xc7}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x8000000) 14:34:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x2, 0x6, 0x301, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000010}, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xb000000) 14:34:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xc000000) [ 1722.121013][T16838] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1722.131147][T16839] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1722.150675][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1722.200280][T16849] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xd000000) 14:34:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f0000000600)={0x2}) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x4001, &(0x7f00000001c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r4 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000640)={'filter\x00', 0x7, 0x4, 0x400, 0x100, 0x0, 0x0, 0x318, 0x318, 0x318, 0x4, &(0x7f0000000140), {[{{@arp={@dev={0xac, 0x14, 0x14, 0x6}, @loopback, 0xff, 0xffffffff, 0x10, 0xd, {@empty, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0x0, 0x0, 0x0, 0xff, 0xff]}}, 0x1, 0x1e5, 0x2, 0x7, 0xed, 0x100, 'veth1_to_bond\x00', 'syzkaller1\x00', {0xff}, {}, 0x0, 0x100}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x2, 0xfb, {0x5}}}}, {{@arp={@local, @empty, 0x0, 0xffffff00, 0x0, 0xc, {@empty, {[0xff]}}, {@mac=@dev={[], 0x15}, {[0x0, 0x0, 0x0, 0x0, 0xff, 0xff]}}, 0xff76, 0x200, 0x7fff, 0x81, 0x3, 0xf82, 'bridge_slave_1\x00', 'wg0\x00', {}, {0xff}, 0x0, 0x30b}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0xff3e, 0x6, 0x0, 0x0, "a40112b5afd34deaaf8b42fe38c941d4961efeda18c47d7795bab1c4a5e5a26224a1e1877a5f89be02476e343318d7b568ed9856ba5db05dfa00bda029d3ef90"}}}, {{@arp={@private=0xa010102, @private=0xa010103, 0x0, 0x0, 0xe, 0x7, {@empty, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}}, {@empty, {[0xff, 0x0, 0x0, 0x0, 0xff, 0x6a328c29de0fd9e5]}}, 0x0, 0x1f, 0x3, 0x4, 0x1ff, 0x9, 'veth0_to_team\x00', 'wg1\x00', {}, {0xff}, 0x0, 0x100}, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x5, 0x101}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x450) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NL80211_CMD_DEL_PMK(r5, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="080000f3", @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf257c0000000c00990089943f5f680000000a00060008021100000100000a00060008021100000000000a00060008021100000100000a0006000802256516d5a0cf0bcf4af9475580169486110000000000"], 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4004040) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000200)) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xe000000) [ 1722.341246][T16861] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1722.359471][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1722.377535][T16863] x_tables: duplicate underflow at hook 1 14:34:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xf000000) [ 1722.387027][T16865] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1722.402857][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1722.412905][T16867] x_tables: duplicate underflow at hook 1 [ 1722.438578][T16871] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/199, 0xc7}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2400c004, &(0x7f0000000040)={0xa, 0x20004e22, 0x2000000, @loopback}, 0x1c) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000000c0)='r', 0x5, 0xffffffffffffffff) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000280)={0xbdf, 0x40}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$IP_SET_OP_GET_FNAME(r4, 0x1, 0x53, &(0x7f00000001c0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000200)=0x2c) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080)={r2}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'rmd320\x00'}}, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180)=@secondary='builtin_and_secondary_trusted\x00') setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000240)=@gcm_256={{0x303}, "39d5d3148dd5c6d1", "1e44e3e3343c59c442c2696336ca588abcd9f9200375335805639b8042d16387", "ffe83c19", "bb59c7c37300c9f5"}, 0x38) sendto$inet6(r0, &(0x7f0000000300)="1e350dd70919fe613d2e42eb0ab82b6c05d3e51763a8f8", 0x17, 0x40, 0x0, 0x0) 14:34:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x10000000) 14:34:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x33000, 0x0) sendmsg$NL80211_CMD_SET_WOWLAN(r1, &(0x7f00000019c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001980)={&(0x7f0000000240)={0x172c, 0x0, 0x4, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x1, 0x4}, @void, @val={0xc, 0x99, {0x97e1, 0x22}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x1680, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x3c, 0x12, 0x0, 0x1, [@NL80211_ATTR_BSSID={0xa, 0xf5, @random="2867bb298cd8"}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x400}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6}, @NL80211_ATTR_BSSID={0xa, 0xf5, @from_mac}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x3}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x40}]}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x1628, 0x4, 0x0, 0x1, [{0x1210, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8}, @NL80211_PKTPAT_PATTERN={0xf1, 0x2, "99e22faca31ef2160a9f2d8ce088cf9d149bff8cf4107a8bd4ddd0e284fc8958c84fe53e9becb5053931b1d3d3e579cc75eb69c612f5a4649462993773d25f6a632cadb2042b289bc3cc917401a85d5dbb2f8e688ca5b80d5466abe8e2335465e24037f28bcc7da08798cd54f9642146571782d793f7d58709b10b6aa52a5ded5803281fb51cd80f9d4f4f6a68860a92ce313fb34d5d4079fd91cdd0a270bac89d7d6a2566a22f04da80aed27a0c6653ef2522858852e947fb05b280aebbc64d759c9460709ede84a91fdbbb711eb8d1146b2756bc282565c56d204710f23242db35ac290be8850a6e66e6fd6f"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1f}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x2}, @NL80211_PKTPAT_PATTERN={0x1004, 0x2, "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"}, @NL80211_PKTPAT_MASK={0xfa, 0x1, "f4f867b9eb78e0975ea8c48a5c7c45cf34007ccfd3ea878b02017e34199552f95161799f5b45004603bd4df626ddbc9482d0b8a99cc911c783d38f946664ba35e8bb94f36303099f2f16a6f126370e2d7937ab363b9ba3f832c6d9b9715e228821f8e060491a6e933c574219a8a8fc28d26874961bc327ae606e80e9649f1aa540ecd4c1e3e4f957b981ede3debf77205c3d11421361b3f9c4905eca4e96bfd1c7d71d3e1b95944ec81c40c654e47ae7814ef8e2ffd3b846f12991a89174a989b10304e6cd8e710e554f4568bd85f0e49c7bcf8807c22f321ab11732941c198fa21708a47f495443986cd3df867112756a6220dbef1b"}]}, {0x6c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x20}, @NL80211_PKTPAT_MASK={0x31, 0x1, "0c4c715da6c8dc9f8abcf1537cf44b78c2950d30f9e0e56935d75c14acc66bf9416d033995391a49a139866e71"}, @NL80211_PKTPAT_MASK={0x29, 0x1, "d5cd87259c537abc8562bf2856930256b487f0596bda82e84c0ab04b031c828f02d9881e14"}]}, {0x238, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x1c, 0x1, "595b506bdb27db95f83c7bdacf92a7be54b12cea785967d5"}, @NL80211_PKTPAT_MASK={0x9f, 0x1, "10ebc68367f99a98533e6338475ad7330d09741eb78f881548cbdc3a76d1d6aceb04f64ca20e458436068ce383fe039d0a0d2f8ce4d3d660e528a51cc925391a12afab6dcc38f103ee98a71ba9f040d87f858fdc71232ba68db7c08a4dc98620eb136097f3746129de67acc2cb680ad5e57360ba4fc7198bf8886c969aa9f8a5447fba91a27967ee8e6d3f8b89aa4394fc888449bb0cde22883b2a"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x4d}, @NL80211_PKTPAT_PATTERN={0x86, 0x2, "cde92c0b59bf362a2f7399e9a0439ee8b8b65c782989a8abf438ed0404011db348dde1cbc331a723a8ab7be9c125c6fac8e469590f8e79fed4d20d899ae42cbb00c10466562dd9adab54a2cd54c737daf9827f981c89cd9b1146aebb3002039f836d7eb2b72f775080b94fb42e8cb7426dd777717e243341834b31c7334b83677f32"}, @NL80211_PKTPAT_PATTERN={0x67, 0x2, "19d4c30725e48021fb76bf5645b7b3b62cb5b73b4bf700ebcdca2a94ba04764fc5130c24c5c4d27da07363712dbb5d4507fdce603ce9a0187483115ae5ea39aa2069bb4c7f68fafd411194844a9c3a58daa1d015116df85c24dd8cd3894dd5f3631a54"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x6}, @NL80211_PKTPAT_PATTERN={0x78, 0x2, "2e5787aeab90fe59f47961073f24e5afd42a2739ea7662d7118299df3846a83ca5ddfb0a7c33baa7304e5a7e8f959751cf46450229dc59ca607f0ed80fa205c971871b737d161977bc2fe11ca59ca9f8b4b777be71404168c62dfda8c4301342e46eeb6e8e4da54bc5d39f3940aea269996b4b0f"}]}, {0x170, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x8a, 0x2, "2bd77113bb8fb174034d1e227a8e00b4351a0c69462005c4b968e40aa258c8beb8b384afebe2bbdcbc9dd64652fd030c64e2172d10a2206aa6e6abf2c6a5a6cafab6bfaea57804280ac4fb4b967e37307bfc9685e4a908c5da8e455abe45e9e1864c2eaf3f8285f5dd803f15328f58ccc73cad7831fb3a1314264a17a7e539f943bf9c0b576b"}, @NL80211_PKTPAT_MASK={0xde, 0x1, "b77a0e8c96809759fe15656c1b4b237b9a4c1ba0bcd923365406a097392e3f1b577f539900f704bf68f493e9ca545128f39efd49263aca3635d4706967e275a3130b6094ecc0d650aaa4afa7d87827ac3c71e63be13108e5fe6ed7f40e2a95d287bddfee6086dbce0f2f0c77065ba83efd28e2eba3da569d704c2c5e0766e30e5905ecdd2fd7535ad4e155ac3de8b678320907ff88072895042a4dc1c47b6c4a61cf31756a0d555104b31a95d63f1d6e63dccb9e1eab91d25e13a5c0ee13645da9f61cf64bb30673dc322f4796e23c6cc9bbb278b3c62e5db92f"}]}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x84, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x78, 0x12, 0x0, 0x1, [@NL80211_ATTR_BSSID={0xa, 0xf5, @from_mac=@device_b}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0xfff}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x54, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x100}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ibss_ssid}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x3c, 0x6, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x8, 0x2, 0x8001}, @NL80211_BAND_6GHZ={0x8, 0x3, 0x3ff}, @NL80211_BAND_2GHZ={0x8, 0x0, 0x3}, @NL80211_BAND_5GHZ={0x8, 0x1, 0x2}, @NL80211_BAND_60GHZ={0x8, 0x2, 0x8}, @NL80211_BAND_5GHZ={0x8, 0x1, 0x4}, @NL80211_BAND_60GHZ={0x8, 0x2, 0x1}]}]}]}]}]}, 0x172c}, 0x1, 0x0, 0x0, 0x4000}, 0x80) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000140), &(0x7f0000001a00)=0x4) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback, 0x26e}, 0x1c) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x11000000) [ 1725.162291][T16875] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1725.254248][T16889] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x12000000) 14:34:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1725.369218][T16898] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1725.377992][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x20000000) 14:34:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:34:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x10) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "0000ffffffde1001", "442065238929350ade91900b51fc9534", '\x00', '0\x00'}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:34:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x25000000) 14:34:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) [ 1728.279961][T16917] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1728.297135][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1728.356623][T16932] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1728.374914][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x48000000) 14:34:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000200)) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f00000003c0), 0x2) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xa4, 0x464, 0x200, 0x70bd27, 0x25dfdbfc, "af1ae8701cf2e813186704b716c623b37a48882f7851d9315922e08cc478a103f4f255b32cfdcd530267150aacc1be429320f290251756ea1b486edb97e5cb8616bb396f04cd2bc6d98f13405ac36567430b9348ae2fd0a19cdd3da60218e2ec653247c80339562d02db9b9e5dcb774dbcd510d17e06a1ec7f82e89e84c78fad85e9c911d1784c9467a99849674486d661", ["", ""]}, 0xa4}, 0x1, 0x0, 0x0, 0x40000}, 0x4040) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x34, r6, 0x800, 0x70bd29, 0x25dfdbfd, {{}, {}, {0x18, 0x17, {0x12, 0xbf, @udp='udp:syz1\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x400c080}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r5, 0x89f7, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x2b, 0x40, 0xb0, 0x7, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x7800, 0x8001, 0xffff}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1731.336474][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1731.354835][T16954] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x4c000000) [ 1731.383298][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000140)={0x0, 0x2}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1731.508650][T16973] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1731.532453][T16980] ptrace attach of "/root/syz-executor.2"[16979] was attempted by "/root/syz-executor.2"[16980] [ 1731.547873][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x60000000) 14:34:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = openat(r1, &(0x7f0000000140)='./file0\x00', 0x480000, 0x4a) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000140)=""/41) listen(r1, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffb}]}) creat(&(0x7f0000000200)='./file0\x00', 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1734.364724][T16990] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1734.374398][T16988] ptrace attach of "/root/syz-executor.2"[16987] was attempted by "/root/syz-executor.2"[16988] 14:34:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x68000000) 14:34:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1734.462766][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1734.483166][T17003] ptrace attach of "/root/syz-executor.2"[16999] was attempted by "/root/syz-executor.2"[17003] [ 1734.495061][T17004] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6c000000) [ 1734.542145][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) uselib(&(0x7f0000000140)='./file0\x00') dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1734.600618][T17017] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1734.628071][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x74000000) 14:34:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x83, &(0x7f00000000c0)=@assoc_value={r4}, 0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r4, 0x2, 0x0, 0x8001, 0x7, 0x401}, 0x14) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x7a000000) [ 1737.387012][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1737.399003][T17026] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x9effffff) [ 1737.489160][T17034] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:34:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xa00c0000) 14:34:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:34:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xc00e0000) 14:34:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xefffffff) [ 1738.182420][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xf0ffffff) 14:34:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) 14:34:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xffffff7f) 14:34:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1740.440460][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1740.468971][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xffffff9e) 14:34:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000140)={0xa, 0x20004e22, 0x4037, @private0={0xfc, 0x0, [], 0x1}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xffffffef) 14:34:26 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:34:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) ioctl$int_in(r1, 0x5421, &(0x7f0000000140)=0x1000) set_robust_list(&(0x7f0000000200)={0x0, 0x3ff, &(0x7f00000001c0)={&(0x7f0000000180)}}, 0x18) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xfffffff0) [ 1740.653511][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1740.679567][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x40030000000000) 14:34:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x100000000000000) [ 1743.446627][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1743.480197][T17098] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x121140, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x200000000000000) [ 1743.561270][T17108] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:29 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1743.638860][T17115] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1743.646300][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x300000000000000) 14:34:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "08000004", "cdf60000da0d00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x400000000000000) [ 1743.686378][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1743.715727][T17124] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1743.758488][T17128] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={[{@noalign='noalign'}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_io_uring_complete(0x0) ioctl$TCGETX(r3, 0x5432, &(0x7f0000000140)) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r4 = syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x7, 0x5, &(0x7f0000000540)=[{&(0x7f0000000200)="bfa147d5bdde29ed9eadea200e824211d274eda61f9c8dd33813e65a65f7b3a3e4f6b29821a09a22d3e446214823f573c384beedd2b1d5a00f0f18ff3470510c0b4e9a4b8dcc00409c6a54e7280a7bf26c28279ceba3b81ba9a616327dafe879b5d18f9694a39f5bd4cc2d633ce315711396ca1c4b4de5347db15641aabe340edc47fe9120007b8bc738f1b50f68597527544a4f9d0386b7c891aba5046f", 0x9e, 0x9c54894}, {&(0x7f0000000300)="c0f7dd0a066306c8f7ec38e4b96bff6874e04fbf6827bd3243229058b872b92110517abf015df14151fa76cd6948ffdd", 0x30, 0xfff}, {&(0x7f0000000340)="2dc35664a8441aef2f6bbb822406b1e29ce074b21706b144ef30c1efe0904ad14aa55a36c66730e8fb231a19f310034c19b07703d5d0258eaea0117e4c7a127047476c6c81a292320d31d53f8f2cc511ff4467ff7407a722d3879133f551f9e4b7af983206ebe7e8bff455d01a3fade1a367796851c4", 0x76, 0x20}, {&(0x7f00000003c0)="054d321e5d045eeca5e1322ead25bdf45dbbf66cf2a6512973d06c020fa48915d287ae64c540c22df774a4a0cbae947159483272a8e5a51ce1cebe128a114fca0878d2706b157968b264c5c9284c6f3ed4b524e9145b752759d5971516f6b36f3c1c2c4647542cd5bfd3c24b097a8fe85d57f0bee62dc3bfea3e09b18c06fb8c03a5fe48bf56f2ae09460daabec704b22bbbdaf0", 0x94, 0xfffffffff6a5774d}, {&(0x7f0000000480)="8e47f36daaea4132beba79829120e249b46e9376829e7ecc883d1990942c6ed3bbb5fa0e2c6c48b7f77c09f9aa94667b9c7083a1583db349c1db247a74e0b74c0d2d493699c456178101063a864e4d5a76c27ae2719790dfa8a6804cf66ed9e1f5b66046a256ef72460940ca6bcbb7bc82ac6dcfac303d71d3ff472ae25009b3a7f6dc96061479356f95188ff782680dd4bf5a60396550d146f7a914f1d8bae20ba4d6ff73e8810f", 0xa8, 0x2}], 0x81048, &(0x7f00000005c0)={[{@uquota='uquota'}, {@mtpt='mtpt'}, {@sysvgroups='sysvgroups'}, {@largeio='largeio'}, {@discard='discard'}, {@quota='quota'}, {@quota='quota'}], [{@pcr={'pcr', 0x3d, 0x3}}, {@uid_eq={'uid'}}, {@subj_type={'subj_type', 0x3d, 'xfs\x00'}}, {@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@obj_user={'obj_user', 0x3d, 'xfs\x00'}}]}) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000680)={0x6, 0xffffffff, 0x800000, 0x3, 0x1}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f00000006c0)=@gcm_256={{0x303}, "cd328363562c4a5f", "bf66cbe9dca860c7e74a9c57a3792d97a79f7a929ae9eda2fc4e9f769b07b1c3", "981ea41b", "d8c879dbcbc19a3f"}, 0x38) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x401000000000000) 14:34:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x500000000000000) [ 1746.480253][T17131] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x600000000000000) [ 1746.529041][T17132] XFS (loop5): Invalid superblock magic number [ 1746.541491][T17145] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1746.621366][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1746.630968][T17156] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:32 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:34:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x700000000000000) 14:34:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x800000000000000) [ 1746.712467][T17157] XFS (loop5): Invalid superblock magic number [ 1746.724734][T17171] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x900000000000000) [ 1746.778036][T17177] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xa00000000000000) [ 1746.834416][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00', 0x10000000}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)=0x0) ptrace$setsig(0x4203, r3, 0x1000, &(0x7f0000000180)={0x15, 0x9, 0xa2}) write$FUSE_IOCTL(r1, &(0x7f0000000200)={0x20, 0x0, 0x0, {0x5824, 0x0, 0x9, 0x6f}}, 0x20) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ocfs2_control\x00', 0x181400, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r6, &(0x7f0000000280)='./file0\x00') sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xb00000000000000) 14:34:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xc00000000000000) [ 1749.538195][T17190] __nla_validate_parse: 2 callbacks suppressed [ 1749.538203][T17190] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x200, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="2000000000001f5015b83dd90f3235ed52a3a570584bf87ddb9083584636c3231944f2e2b1bc41ecca6f8a9debeacc37568100d4b3d61a36af2cc6f87bf35f7131ded04fab525ab935f7a4617df63d8ca2c707a411ef77c1bac953e3ad25d1cad55e304c51037f7791b21906a6602b37de52f2d41c773cb247f0008798c1bd618e1737205f5533d040af662b3880249ecf95fd45561bc900"/163], 0x20}, 0x1, 0x0, 0x0, 0x400c810}, 0x1c) [ 1749.596144][T17195] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xd00000000000000) 14:34:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = accept4$alg(r1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e64, 0x3fa8, @ipv4={[], [], @remote}, 0xff7fffdc}, 0x1c) listen(r2, 0x100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socket$inet_udp(0x2, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c00800010000108000000000600030000000000", @ANYRES16, @ANYBLOB="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"], 0x3c}}, 0x8000000) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000006900100027bd7000fddbdf25000064ab0000000308000100010000007f3adb4fe9d485bd1def83b5142a07d47f27f8f43aee364661b9ec96886476c98dca14cce06ad22c551b506dbb2177f1e8efc37407ba911396b5992ea3ea633533039eb3cef0fae9b184fac7000000000000000000000000f2d93206963e118a17602d35deca4e2d55ab4985d4a664351bab1a6b127e0d9d853ca78a31cf8bbb877fe3"], 0x20}}, 0x80) read$hiddev(r6, &(0x7f0000000280)=""/103, 0x67) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)=ANY=[@ANYBLOB="f8000000", @ANYRES16=r3, @ANYBLOB="200029bd7000fbdbdf25030000001c00018008000100", @ANYRES32=0x0, @ANYBLOB="080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="3c00018014000200776c616e3100000000000000000000001400020076657468305f746f5f626f6e64000000080003000100000008000300010000007000018008000100", @ANYRES32=r4, @ANYBLOB="0800030003000000140002006970365f767469300000000000000000080003000100000014000200626f6e643000000000000000000000001400020067656e6576653100000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="081403000100000008000100", @ANYRES32=r7, @ANYBLOB="05000500070000001400018008000300010000000800030002000000"], 0xf8}, 0x1, 0x0, 0x0, 0x8890}, 0x20040001) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(0xffffffffffffffff, &(0x7f0000000680)="39a12fea086d67ed09b8c53f672e616fad91025ca63d2bab5af27869a3521e53fcae1f2475a75aa43c2a996fc207123b989c5c74312a00000000cfb28d41aa8c7da92a054c4d8fb5ab5a861b16b9b44427aded5d900941082f78e13af84b05485bbd55f5a74f1918c3037892ca8073d7a9d0d23480e20811ac462ddfdce3aa9773c5bf7f6a8f3ee6758916a925f2dae160faa7278764dcd734468f9b36c7d6b29b738556147d499c6a16a2dc7c26041063608a2ef1662b8ffd3a3190395dac459b222f63a8db2bfda9b3201f0d642ec669", 0xd1, 0x40, 0x0, 0x0) 14:34:36 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:34:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xe00000000000000) 14:34:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1749.767553][T17206] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1749.829188][T17219] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xf00000000000000) 14:34:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@ccm_128={{0x304}, "000000008000", "3353ae6f331de6e9a9c7e1f8b8e8a400", "bdc9c6f1", "cf1cd3359cc89b08"}, 0x2b) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7fffffff) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000000100)=0x9) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:34:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000180)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_256={{0x304}, "7dfd14e9d1dc54dc", "a892189ad58d8f1339ed0f35e8fdc222efee929f66e629524f2d28a44e90e0a8", "8e89df1f", 'vA\x00'}, 0x38) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1752.555951][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1752.582439][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1752.596154][T17229] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x1000000000000000) [ 1752.667757][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1752.689465][T17239] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x1100000000000000) [ 1752.723113][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:39 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x1000000000000000) 14:34:39 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1752.772336][T17246] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x1200000000000000) 14:34:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x2000000000000000) [ 1752.816320][T17250] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1752.842273][T17254] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1752.894859][T17259] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x400300) 14:34:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x2500000000000000) 14:34:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1755.597231][T17264] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1755.625029][T17266] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1755.662123][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:34:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x4800000000000000) 14:34:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xd00) 14:34:42 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1755.749969][T17278] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1755.757123][T17279] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x4c00000000000000) 14:34:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6000000000000000) [ 1755.864806][T17288] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1755.892153][T17288] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1755.939828][T17296] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6800000000000000) 14:34:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x6c00000000000000) [ 1758.657883][T17301] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1758.715515][T17308] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x7400000000000000) 14:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1758.895166][T17328] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x7a00000000000000) 14:34:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x8000000000000000) 14:34:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x9effffff00000000) 14:34:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xa00c000000000000) [ 1761.907390][T17367] __nla_validate_parse: 3 callbacks suppressed [ 1761.907397][T17367] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xc00e000000000000) [ 1761.982531][T17376] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xefffffff00000000) [ 1762.057912][T17390] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xf0ffffff00000000) 14:34:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xffffff7f00000000) [ 1762.111818][T17394] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1762.146322][T17396] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0xffffffff00000000) [ 1762.179304][T17398] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1762.216204][T17400] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:51 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x4) capget(&(0x7f00000001c0)={0x20080522, r0}, &(0x7f0000000240)={0x4d, 0x2, 0xffffff73, 0x0, 0x97, 0x6}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000100)={'nat\x00', 0x0, 0x3, 0x11, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000080)=""/17}, &(0x7f0000000180)=0x78) sendmsg$NFT_MSG_GETSET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:34:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r6, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) r9 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000080)=[0x3, 0x8]) 14:34:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r2 = socket(0x2, 0x3, 0x6) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WOWLAN(r3, &(0x7f0000008b80)={0x0, 0x0, &(0x7f0000008b40)={&(0x7f0000001800)={0x30, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x46}, @val={0x8, 0x3, r5}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)={0x184, r1, 0x200, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x1, 0x7e}}}}, [@NL80211_ATTR_CQM={0x14, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x3}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x7fffffff}]}, @NL80211_ATTR_CQM={0x14, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xffff1a38}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x1}]}, @NL80211_ATTR_CQM={0x1c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xfffffff9}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x4}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x3}]}, @NL80211_ATTR_CQM={0x54, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x4f6}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x2}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x7}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x319}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x1f5}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x8}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x2}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x53}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x400}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x4}]}, @NL80211_ATTR_CQM={0x3c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x8000}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x3638}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x2}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xffffffff}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x5}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x49}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0xfffffffb}]}, @NL80211_ATTR_CQM={0x24, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x4}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x529}, @NL80211_ATTR_CQM_RSSI_THOLD={0x10, 0x1, [0x101, 0xffff7fff, 0x4]}]}, @NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x9}]}, @NL80211_ATTR_CQM={0x38, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x57}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x54b}, @NL80211_ATTR_CQM_RSSI_THOLD={0x14, 0x1, [0xfffffffd, 0x85e, 0x5, 0x5]}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x6f}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x10001}]}, @NL80211_ATTR_CQM={0x20, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THOLD={0x14, 0x1, [0xcf, 0x95, 0x7, 0x7]}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x1}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 14:34:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x44, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "cf"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4, 0x5}]}]}, 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r3, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x4) [ 1765.917944][T17429] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1765.929452][T17429] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x98, 0x1, 0x3, 0x3, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x4}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x2}, @NFQA_VLAN={0xc, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}]}, @NFQA_CT={0x40, 0xb, 0x0, 0x1, [@CTA_NAT_SRC={0x34, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @private1={0xfc, 0x1, [], 0x1}}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xfff}]}, @NFQA_PAYLOAD={0x28, 0xa, "249aac7226537b1d8ac7483467a671fc4b7fddd1b1b005b1f236d0acd8337b81871539e5"}]}, 0x98}, 0x1, 0x0, 0x0, 0x40a8010}, 0x4000001) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c36a55"], 0x118}}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x1, 0x3b, @mcast1, 0xf6c}, @in={0x2, 0x4e20, @loopback}], 0x4c) 14:34:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x4010}, 0x4000080) [ 1765.968211][T17434] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x10000, 0x1, 0xc}, 0x18) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x20000000) 14:34:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:54 executing program 3: sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c301bc0000000000"], 0x118}}, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x140c, 0x200, 0x70bd27, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000881}, 0x20000010) 14:34:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x1d, 0x2, 0x2) set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x1ff) connect$can_j1939(r1, &(0x7f0000000040), 0x18) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x1d}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x5, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}, {0x5}, {0x6}, {0x8}}]}, 0xf8}}, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bpq0='bpq0\x00', 0x20, 'syz1\x00', @bcast, 0x9, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) 14:34:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000000)) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="180100000a0a010243c0e1438c16e79917f2bd163eebb20da102ea5e3d50dfc44956834ff14c4857dcf2431b75f70f19ec1fa62d992c2665578c4f13122b7d912c210b18862c7fb97b70d43b0db203049a384d9272f76fb38da087b2b238aeb81349b01e162a0aaa71edf8431334edf22b2b4d60adb8723afc546c942865b3dd55448b9da64e8314b36bff935524bb753cc54e8c464883dbcd182f3cb2a731d24e0a522bafeafa6b4e5736680a9453c6b8acc78e0d7c2aad2c9a8957dd6073217d8d0a3d76d69526ff7484d959862db4d77682fb518faa4551ea2a6fbe33a4c51a2833e01f"], 0x118}}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=r5, @ANYBLOB="da0b01da6f91e432f10b17000000000000000000000000017b3e26432e93f9f4d4ec10aca22581a053cb56399e60380b118057fcdd2dd45f0aaac65af703ad0fb0f663141c415a6523fc4c8928fe5d94aa"], 0x3c}}, 0x0) ioctl$TIOCL_SETVESABLANK(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, 0x0, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x50}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x40080c4) 14:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1768.070999][T17458] __nla_validate_parse: 2 callbacks suppressed [ 1768.071007][T17458] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1768.092756][T17458] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1768.158435][T17469] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1768.180713][T17469] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1768.202983][T17469] device ip6_vti0 entered promiscuous mode 14:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:34:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) [ 1768.264161][T17477] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1768.293425][T17477] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:57 executing program 3: sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:34:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:34:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="18080000000ad4a3"], 0x118}}, 0x0) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, 0x0, 0x8, 0x70bd29, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}]}, 0x20}, 0x1, 0x0, 0x0, 0x8814}, 0x8000) ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r0, 0x40184150, &(0x7f0000000080)={0x0, &(0x7f0000000000)="8dc00929be82c5ca99e360", 0xb}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_GETXATTR(r2, &(0x7f0000000100)={0x18, 0x134dae7d6c3973d9, 0x0, {0x4}}, 0x18) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x10000, 0x0) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r3, 0x40184152, &(0x7f0000000300)={0x0, &(0x7f00000001c0)=[&(0x7f0000000240)="313c79e81839b5b3743c65781b55cbb2fbec889f54a58d0d105a43fcdb890251a11f598a3e5c19d8d75f8d1e8270100fefe2b25429313ebfdfb846ff4f1eaee9270dd992423d068d9ed0c66f7d97c189b8fae0e5a9354a22de18146a5e4506e3d7e2d08e5a6d9abb44b8f2051b2a7934825798ed5fcc804560d8aec6a117f07c4303d2e5e5ea5bdbd2", &(0x7f0000000180)="4a6c21a9d24a3b1a020afbcb88babc86b615af2e3b1d550002b2796d09c885dff664cd790238"], 0x400}) 14:34:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x118}, 0x1, 0x0, 0x0, 0x80}, 0x0) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000080)=0xc) 14:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:34:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_RMFB(r2, 0xc00464af, &(0x7f0000000000)) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:34:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1771.255401][T17528] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1774.044997][T17543] ptrace attach of "/root/syz-executor.0"[17542] was attempted by "/root/syz-executor.0"[17543] 14:35:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x240, 0x0) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x2, 0x6, 0x301, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r2, &(0x7f0000000000)=0x6, 0x200) 14:35:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) getegid() [ 1774.191198][T17559] ptrace attach of "/root/syz-executor.0"[17558] was attempted by "/root/syz-executor.0"[17559] 14:35:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, r4, 0x1, {0x0, 0x1, 0x4}, 0xfd}, 0x18) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="180100000a0a01023d0b671f773c9b3a4d665e38a77ea49fe3d2c9eb87f5c8d5fd5332f0e79f01784f7b5535380299cee20dc98ec5b954ef70626fc84976324137bae7ccc67e671f9afb89405904e551dced6be4d0e67db802bc566876928cafcdc67d6c49366c9a28083cb7ca3bdcc13b4331097c62cebfb5a6eaa6a60b1f48c6cf3f0000002e46a2b5b2b4ec4b38ea344312e09acb3bd27e3ea0e1e7017fc3c1cf81df4e7800bcdc1743efa651767d08a6f6aa597171929581"], 0x118}}, 0x0) [ 1774.233626][T17564] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1774.255479][T17564] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="0098ee00000000a98469d5f80bdbb5870b207b3da5798a00"], 0x118}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x100) write$P9_RMKDIR(r2, &(0x7f0000000000)={0x14, 0x49, 0x2, {0xc0, 0x1, 0x1}}, 0x14) [ 1774.317311][T17573] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1774.334163][T17575] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYRES16=r2, @ANYRES32=r1, @ANYRESOCT=r2, @ANYRESHEX], 0x118}}, 0x4040010) 14:35:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x118}}, 0x0) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x140f, 0x1, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x9, 0x45, 'issm\x00'}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xa, 0x45, 'ipoib\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0xc001}, 0x10) 14:35:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:03 executing program 3: sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x4, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x7}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x800) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xa5fcc19d1f3bc255}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x5, 0x1, 0x3, 0x0, 0x0, {0x0, 0x0, 0x7}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xe041}, 0x800) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={@null, @bcast, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) 14:35:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYRES64], 0x118}, 0x1, 0x0, 0x0, 0x8001}, 0x0) 14:35:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1777.233981][T17603] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1777.244226][T17603] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_BATCH(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x4c, 0x0, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_DELSET={0x30, 0xb, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x39}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x37}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x40}]}], {0x14}}, 0xa4}, 0x1, 0x0, 0x0, 0x10080}, 0x44) 14:35:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000100)={0x2, 0x80, 0x5, 0x0, 0x5}) [ 1777.360999][T17613] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1777.372642][T17613] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="18010000ff000000"], 0x118}}, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x200) [ 1777.407229][T17616] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1777.418414][T17616] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000080)={0x3f00, 0x9, 0x7}) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x83, &(0x7f00000000c0)=@assoc_value={r3}, 0x8) recvmsg$can_j1939(r1, &(0x7f0000000500)={&(0x7f0000000240)=@nl=@proc, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/87, 0x57}, {&(0x7f0000000340)=""/130, 0x82}], 0x2, &(0x7f0000000440)=""/173, 0xad}, 0x40000000) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000100)={r3, 0x80, 0xfffffe00, 0x2, 0x100, 0x100, 0x4, 0x185, {0x0, @in6={{0xa, 0x4e20, 0x400, @remote, 0x9}}, 0x46db, 0x2, 0x3, 0x7ff, 0x3}}, &(0x7f00000001c0)=0xb0) 14:35:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1780.054006][T17622] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x40000, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, 0x1, 0x8, 0x201, 0x0, 0x0, {0x7, 0x0, 0x6}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x892f}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8100}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x9300}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x20000810) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000100)=0x4) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYBLOB="aa01a473433820c9d21eb6f4d026e4ec5e3e41f84b02a229577f9c0f4e7c956faca576a8be01b0c8bb3403bfe41ca9c12204606bb2b55fa7ee863f79a245df794f", @ANYRES64, @ANYRESHEX, @ANYRES32=r5], 0x118}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 14:35:07 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4984c0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="180900000a0a01bb02"], 0x118}}, 0x0) [ 1780.838165][T17631] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000240)={{0x0, 0x0, @reserved="64a3518c64a51087828fc62ed82c6d8f29d631d303b0166b6f01d326c259a642"}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x83, &(0x7f00000000c0)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e21, 0x10000, @loopback, 0xf4}}, 0x9, 0x1000, 0x7ff, 0x57a, 0x3}, &(0x7f0000000000)=0x98) [ 1780.944045][T17658] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x2, 0x3, 0x6) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WOWLAN(r4, &(0x7f0000008b80)={0x0, 0x0, &(0x7f0000008b40)={&(0x7f0000001800)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000004a000000080001004600000008000300", @ANYRES32=r6, @ANYBLOB="0c0099005f3f29d6062c4100"], 0x30}}, 0x0) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x7c, r5, 0x8, 0x70bd25, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x1f, 0x6f}}}}, [@chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x37}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1644}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x6}], @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40001}, 0x40000d1) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r7) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f0000001300)="d252fabf9f28b999f1309d407a5bb6038ff5a996dac54aa4b6f7d200ea1004dbe606c2477f66dab5c3408a85bb41ceb1adcfd021fb5a9e72e5e1754ac9829a30240f6d9fa4378e0812bf52401bcb8f5b67b8069e8203d20b559ed8feebe5d97e99de8cbeddffac857e1d6234bee2b03b32a6b7092d9240d475d1cc8fcc114eba655574cbe1340aba9df792ee44e307ca53baa16df1362b89995064dc034ac1b60c0e75498f7a90d9db043088c4f1603b78f503f7275cd8dfcdedaa35c0e7a95c03ed8aca7d69e3981466eb8b9a0316150000000000000000", 0xd8}, {&(0x7f0000000240)="1c468ee8f37ca3a245b5087175036e391ec81a6e9365638ae62c0705778d15e21cffb45f4c8164808df05ddd1555dd1c7c0af159221fcc53b98c3365efd1dcda1d68a20862ea3e3ee83280e6d33ba70fbc6ba6924e9cda4dcf797950c1760dcd57ef1e002f2271180a4b168ce6b519a12d1ab1741f29665201904d67ff32d1a70a23a6a743be08190c9a47e52d3ada80bb8a1897fb00000000000000", 0x9c}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000000000)="4145fde2843613f0ac2c56f56749320fbb569a03f91a6d33dc67adee3248c7aee971e5ee4d1df6100e0dbc120b2aec8247", 0x31}], 0x4, 0xa) [ 1781.743412][T17659] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="464fdf6b0a0a2102"], 0x118}}, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000140)=[{{0x2, 0x0, 0x0, 0x1}, {0x3, 0x1, 0x1}}, {{0x0, 0x1, 0x1}, {0x3, 0x0, 0x1}}, {{0x2, 0x1, 0x1, 0x1}, {0x2, 0x1, 0x0, 0x1}}, {{0x1, 0x0, 0x0, 0x1}, {0x2, 0x1}}, {{0x3, 0x1, 0x1}, {0x1, 0x1, 0x1}}, {{0x1, 0x0, 0x1, 0x1}, {0x0, 0x0, 0x1, 0x1}}], 0x30) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x16c, 0xd, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x138, 0x3, 0x0, 0x1, [{0xe8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_KEY_END={0x4}, @NFTA_SET_ELEM_USERDATA={0x35, 0x6, 0x1, 0x0, "45ef598a5ffdeba9b5a6d05618b2bba7275c6a73f4b15b1e6c4561559e0d2862159729d75d8bd8653513c542f5c72a02f9"}, @NFTA_SET_ELEM_USERDATA={0x89, 0x6, 0x1, 0x0, "205a05b04d3490934cb042cb0333372ecca29ed3b9d6d0badd62bdd108ba1fb37cda06adfa6f3a312cde9c5ce87a98f4313ffe5270fc7b4c4f86dc2d324fb74f663b93463bd8ec682d1cf0bc7193a2568175a8c3b4eaa59a71d7864bd1e884416979a4841b647711cc59746338bceb5701f2636872cc7e27fbf16f6e1304b486b418386ead"}]}, {0x4c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x40}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0x21, 0x6, 0x1, 0x0, "a446719a2a811afc1389fb3872cfad4e37d020ed496c9269a776678044"}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x194a0000000000}]}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000040) [ 1781.793476][T17663] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1781.807540][T17663] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="f60a120053d6dd28bfb1093d0ca100001f00b516b1e93f467ff2391f0f76438119e5771eb2"], 0x118}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$rxrpc(r2, &(0x7f00000000c0)="c737163838eee895ea596ae92151752469f2acf4e0faed7b5c39ac0b57b628279253cefeafd607d78d4b1fc735592558fe45d77c770206bd2e85ee252c8573d6f967013a246c672bd1e886f9f92925827f3205cf19aa1e45b107719b6347c3104ee969fe903a8469837622d40fc0dad41b964fad5607c29ae202072f4ba045f69f0c1be214d8b81cf9838f0dba815acdd58db8b819a47d3a285a4fdfad9f3f12b4f303717df339b6266febb388d322029150e123f9246a2ea9524d5f4fdd56dd2608a7763890cbc1ea", 0xc9, 0x0, &(0x7f0000000000)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x44}}}, 0x24) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:35:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) eventfd(0x2e1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xe0, 0x1, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x7f}, @CTA_TUPLE_REPLY={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_SEQ_ADJ_REPLY={0x24, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x9}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x100000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x6}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x8}]}, @CTA_PROTOINFO={0x30, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x2c, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0xce}, @CTA_PROTOINFO_SCTP_VTAG_ORIGINAL={0x8, 0x2, 0x1, 0x0, 0xfdd}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x1}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x81}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x80}]}}, @CTA_SEQ_ADJ_ORIG={0xc, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x6}]}, @CTA_SYNPROXY={0x1c, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x9}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_SYNPROXY_TSOFF={0x8, 0x3, 0x1, 0x0, 0x6}]}]}, 0xe0}}, 0x4000084) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="4e43f093cde6d32197e9346b9244524da68d8e608f042ce6bf0b0500000000000000bc2ca45371b62e89da78c7e41d293e4fad5f70e4d2eda8ac6d0f295951115738544ea77ac1a3480297f09d04f5b71d6a00f5c705319a015ee10b8d"], 0x118}}, 0x0) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x12d) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000300)=0x9) 14:35:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:09 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:35:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000000)={'syztnl2\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x4, 0x7f, 0x7, 0x2, 0x20, @empty, @empty, 0x8000, 0x20, 0xffffff83, 0xec}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000180)={'syztnl2\x00', r2, 0x29, 0x9e, 0x5, 0xf5, 0x39, @loopback, @mcast1, 0x7800, 0x8000, 0xba, 0x1}}) 14:35:09 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000100)={[0x4]}, 0x8) write$P9_RLERRORu(r0, &(0x7f0000000140)={0xd, 0x7, 0x1, {{}, 0xfffffffe}}, 0xd) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="7f000000dd000000eb2f6a7c2ba0e96412a2219b78be2b21cd62be415c0b183f3588cc4d7dbde64468b05b8e1d02f23d61b890c156bea507473cf5e545924382c6a759a989fc00d9aff928025ae137862afd99e1283eed48d9c363202d23157e37fcf72241f71b3363ff227197d7d41b20693465b0c1cb963d75897aa386278b65a31f9240f207f913f147d4485b302a4c395575b84f420f68d96b89b618b5164da715782f224321092249ac95f9d190ff138098e61bc622a47d24d2276db0da"], 0x118}}, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000080)={0x0, "f866dec50d67e4f205651c9b0a1d965f91169f8f8fcc367ef26e8bf14de7fc1a", 0x6, 0x400, 0x8001, 0x7, 0x4, 0x2, 0x6, 0xcc2}) ioctl$HIDIOCSFLAG(0xffffffffffffffff, 0x4004480f, &(0x7f0000000000)=0x3) [ 1783.356506][T17695] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1783.388311][T17695] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x40) [ 1783.463510][T17709] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1783.473679][T17709] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = dup(r1) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8002220}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x58, 0x0, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}]}, 0x58}}, 0x8004) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x2, 0x1, 0x1f, 0x0, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000003740)='SMC_PNETID\x00') sendmsg$SMC_PNETID_FLUSH(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000002400)=ANY=[@ANYBLOB="50c30000ef", @ANYRES16=r5, @ANYRES64], 0x50}, 0x1, 0x0, 0x0, 0x24001814}, 0x4005) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="340000009d4eada4881b1f5c882bac68f098c7372106922bf8c900514148378a51e5c39e182b9d6ffa2199cd2078180a", @ANYRES16=r5, @ANYBLOB="08cf27bd7000fcdbdf25010000001400020076657468305f746f5f626174616476000900030073797a3000000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r6 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000140)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xd0, r6, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:lost_found_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:devicekit_var_lib_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:hald_dccm_exec_t:s0\x00'}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20040004}, 0x20000000) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x94, r6, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'tunl0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @private=0xa010101}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={[], [], @rand_addr=0x64010100}}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:var_auth_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010102}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'syzkaller1\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x64010100}]}, 0x94}, 0x1, 0x0, 0x0, 0x24044001}, 0x40) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r6, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x1) 14:35:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:35:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00') pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpeername$netlink(r2, &(0x7f0000000440), &(0x7f0000000480)=0xc) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x3c, r1, 0x609, 0x0, 0x0, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}}, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x8002, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$can_raw(r5, &(0x7f00000004c0), 0x10) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x208000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xb0, 0x2, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x2}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={[], [], @rand_addr=0x64010100}}}]}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x5}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x1f}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_MARKMASK={0x8}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x200}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0xb0}}, 0x2404c844) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00032cbd707e860d1ff1e340d900080001407063690011000200303021303a30303a31302e3000000000"], 0x30}, 0x1, 0x0, 0x0, 0x4c010}, 0x8004) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:35:12 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0145608, &(0x7f00000000c0)={0xffffffff, 0x1, 0x4, 0x0, 0x0, {}, {}, 0x0, 0x0, @fd}) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000001c0)={0x0, 0x1, 0x4, 0x0, 0x7, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "d81cc39e"}, 0x0, 0x4, @fd}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[], 0x118}, 0x1, 0x0, 0x0, 0x4800}, 0x0) r3 = accept4(r2, 0x0, &(0x7f00000006c0), 0x80800) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000000)={0x48, 0x0, &(0x7f0000000140)=[@dead_binder_done, @register_looper, @register_looper, @increfs_done={0x40106308, 0x3}, @clear_death={0x400c630f, 0x2}, @request_death={0x400c630e, 0x2}], 0xc4, 0x0, &(0x7f0000000240)="f6acb38cb41097a52d0293d03f29cf4db029dbbf5dc6be7db1bf889a585549abef6b72d5cd053c2ba0f5071e7b692259d02ddb81369ddf43e73b14e380da99801149049e4494ad239fd7bdbab8478606ada4e6fdc74ae431c5f3f11f428201460d367b69734792259ea7de5a9e0abacaff42b846af2a0eb1aa8d6aeb8edc3a4a14ac7a1656c304d1262d87f7cd562c356db20f104fc7ce58acd47921689a1c50b70ce181eab7cec0f0a8de705d2910baced7bf9d9bae92d67ded387b19e560fb5be196c0"}) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000740)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x10c, r4, 0x316, 0x70bd2a, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x77807171c8ad0abe}, {0xc, 0x8f, 0xffffffff7fffffff}, {0xc, 0x90, 0x101}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x10000}, {0xc, 0x90, 0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x1}, {0xc, 0x8f, 0x80}, {0xc, 0x90, 0x7}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x1}, {0xc, 0x90, 0x65d}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x800}, 0x4000001) [ 1786.114624][T17718] __nla_validate_parse: 3 callbacks suppressed [ 1786.114630][T17718] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:35:12 executing program 3: syz_init_net_socket$ax25(0x3, 0x5, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x50080, 0x0) sendmmsg$sock(r1, &(0x7f0000007480)=[{{&(0x7f0000000100)=@isdn={0x22, 0xf9, 0x81, 0x4, 0xf7}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000080)="857b39462f32dfbe1a330d1a5a8fb0af1f04e52356d7d5f4533478ca43", 0x1d}, {&(0x7f0000000240)="cd300c99e49ce6297255b0344457046af4520b02998023cbcbf8444c5053aa98153bc7a837ce106cabd5bcc725d8b12abb69f5766b783a6ca796511fa42a43c84d504f3084da3fbd7300549990d9274e763b162b692c2f1e50547696b90f3802caeb7a29e71a3f247766c5dfba55f664af389e6b35655d3c15ec03ddf2d2d06518f17fa706002265e91552f41be8e39a562cc80409133361a5e5327c51d7ae638bec6140475faa5a464afbd01553b125aaa1a21e300239b2d6f4ea70dd571b60fcbce8504bc097d1927b5deb803d670b", 0xd0}, {&(0x7f0000000340)="9485560aae103719e95132996fbdb2ce7fca74417aaad407ffe5ca9e2d247c4b83cdb5ef69218a1276df206367bc3526f7a0ba6d2e788a693349a042b621a2319889b776719747935a0da53f60a6208575fb0d3452c093e891be4f9a9892b114767da8ab206ab712278b1b8565b770798c1c997bcd3de6bf206d55541e88ab160dad3599c858cb559e447f449923434052570922363dccbe98f08a3d138401885a6cce565407f7405e60cc9efb03f4cc4b8ed43d1af7cd348ae39f77b763df3b64d9cbf414842c97543a281f5f04ca745b2aa8bb12bc44f0ed47501966aa3b1770f2f1ec15", 0xe5}, {&(0x7f0000000180)="351a2a002c3c0064a7f0572fc1a9a44a17a64a0a2b704b83b7a9f79511f2fb167a3c384a498d", 0x26}, {&(0x7f0000000440)="5476fee81f6d612aa41f09590d58616156486179f5c4b967fb40ab35ee920fd10f9d1c5d4bcfb52247b0e6b2cb6ac16728e636d253744108578af6a3e2ca386f312e6c7d426ab330f7aa6423c53bca94227575378db90cdf9b816c2014ccf843a95c66c65377d16cb73ccba46a9c94cf64f28dce02b5b003dfe625214e9445fbaa935e0c1e08ff99f549ea38eb2e46dad37ad5ed2f82180eec9a23534e4ba9c0287d3a0229c4bf653712f75a64f86b38c3c841e4", 0xb4}, {&(0x7f0000000500)="d9b42668c407b20fbf3e18886814d9c5282d6177959a1af6de8759c60b6633daaafc7f52e4512465fe8b3215647b0bb5e18b118eaf65da6c9a0c4d9445aead813cea77b0231cf0f289b8cc5c7f2645f0316220d3a17556231dc888d8a4cd52eab201528295456e99a8c001a2a8c3f095cfbbac6655d691b140d3494ff251364092796210e36fb4bb0d28bfb8c94eb160c146be962900c75ebec53bdc7cb55c540462911a21d693bb940863f0200b94b8f1a93aae919d5f50c6f998c5885066eeb08d1ba388da9093348ad22106586be9faa4219c46c4802dceb32005f553b2620d3f34aa905971a441e707cc96", 0xed}, {&(0x7f00000001c0)="d75d8732b60463c12769d49ea4b93bec4b81bc", 0x13}], 0x7, &(0x7f0000000680)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0xf28}}, @mark={{0x14, 0x1, 0x24, 0x3ff}}, @mark={{0x14, 0x1, 0x24, 0x2bf}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0xd8}}, {{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000000780)="a43226fa6e4a678b13e33765dc612e13035754cc54ace0e1abbe9a2a5a817fd76be9b14dc6839a94e8be3f31021bb82cd15ddf8c9aad16e87eea26b0f9bbd9a2563b38a297030af9979b4ee7dc848d812ef26b6404bdd1abc5652b9cf990072348147cb334c424fce91686f8236cea277a37f511dc6adce6e5c4fcb332546f9d24ac315f6315f511580588356173ce6ff29c", 0x92}, {&(0x7f0000000840)="c1a4747b997440859ac57e11fcef5efc1f9d476006e259b8a4586f", 0x1b}, {&(0x7f0000000880)="c6b75d3e59", 0x5}, {&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000028c0)="44a718ed0b185fea458e90d58cba6247ea2c218a4ce86d7d17774fd288da6a4add0b610102", 0x25}, {&(0x7f0000002900)="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", 0x1000}, {&(0x7f0000003900)="5939e14febd94f29660c9af5e2a10903443d27a717a2337e0d301176728c3c70fdf710c399c310adcbf42fc65a7b43ffd9f137a7a96c65e2ccd96f5978e89e48fe242f06be39176914f7d27fd5bb7eb36625402c34b957801ee668cb6fd243b1ce1abf6b85113399f04005168189c1fa09b1f82fc4f031b66c531d3649fdc95e2e6f66ad7ee03d0b708a23c3cf3a1322513bec479dc9b33e", 0x98}, {&(0x7f00000039c0)="00529218b764bc7e8d383f7a94c75b65804f14a9caa108da0f44d7c0374e251cd4773158fb22253824079ed2b23cb4070484cfa886b9e403ce03c1a2fb91b50e23ca0576f48a66e244856a135ec72d82962b3d9d7e21978ae811ac9fbd81200e20b7bb56ac1588ea2664c8071f3e80fcff5724b42e193155259a11d4cd54b97fac912a2541339d86e627c8dc215ec15afbb59f6b8c", 0x95}], 0x9, &(0x7f0000003b40)=[@txtime={{0x18, 0x1, 0x3d, 0x200000004000}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0x48}}, {{&(0x7f0000003bc0)=@pppoe={0x18, 0x0, {0x4, @random="a49dbd8625cd", 'team_slave_0\x00'}}, 0x80, &(0x7f0000004040)=[{&(0x7f0000003c40)="ba280c8643383e7086c282f47843bb829be0e65653a951b81c62eed84d57244c254f1376db9bae76c029989cd4a6febd29f717a8ca9c75ab8e25b74f510c016ab1aceb9551bf67c1eca7730ee2defbf9e7071409141ace5673a7d9a199795d69a19b4856ec1e3131ab72d92c165fbeddb3ad0e384e744ca2a104ec81b52901045a778e88dd861459942fdbeb8de414e483783a1a3af01a7eb70d8233fbac2642f7f8195c8907a2fe949a83d542f0938b100300c9375df6", 0xb7}, {&(0x7f0000003d00)="1a6396ae50aba7dbeecc81f773b2", 0xe}, {&(0x7f0000003d40)="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", 0xff}, {&(0x7f0000003e40)="6657d7648bdebdcf43996f43e9aa22d7d46813d9bf0cc02ca1fe5b7f07abcc37a802eae99e61a1f0aa55bc6c834e58733ead6e7e76285a47e652fc81f0d7e82da9f49f3bca86c9259f51ba3ca5b11427f682d37f987e36da65c28d1b3f10cfae06700c1027c59cd98db9a6cf3f2a218a4edd644673205452c8cb1e64f73819589efc3b09f6f0cabc248ad9ac5f6fb4bf6dc346dddd5c3051087b9daa62c787823936bc8dad581a2ae1dd69ca358cfa47476e5fa786c96e12ca530f11369a64b674d1521423cbdd582cd9407eca7a79bc515aeed0422bb5958d6725fa03cea6bb3a19e4d25d490a", 0xe7}, {&(0x7f0000003f40)="de551fb30c7ce07af68c2c57bf46d291734d26e6cdb70b51fd3cbb6d89991d77d0ad6967cb48e96bb14ef213bc43e49d2e9e1fd53807ebb9eb8c14da47b1461fb569013ba7785deafae202fbeaa892a8ea56ef59914906c9bd717e3f5fb83d27840b9c536e967d549b7a2a9607c0995185563bb27f064545dbfdfc3fb420d71d9cb6504c7a351acd77e2c806c353d8781de607fbad774cb7cba17a563e9f2f0c3cfa4dcdbd5ac9c1956cad817e48a90c760b14f43b1251babf3e2d91f916bdc5fa537e5b2e8c0165b54f7d574731e4e0", 0xd0}], 0x5, &(0x7f00000040c0)=[@timestamping={{0x14, 0x1, 0x25, 0x757}}, @mark={{0x14, 0x1, 0x24, 0xfffffe00}}], 0x30}}, {{&(0x7f0000004100)=@qipcrtr={0x2a, 0x2, 0x3fff}, 0x80, &(0x7f0000005180)=[{&(0x7f0000004180)="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", 0x1000}], 0x1}}, {{&(0x7f00000051c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x80, &(0x7f00000073c0)=[{&(0x7f0000005240)="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", 0x1000}, {&(0x7f0000006240)="541f36f7896956dbc90b28b29d10e0", 0xf}, {&(0x7f0000006280)="472f4478e3f6cbce0a4fe9a70b01e4ee9367875014d9f137e1f86c11015adfa20cd14d8992e9ecc4eff28caaa6a7d23c6cfa795d89c4a1d41691f2201ce74d75ec7d789702abfa794194be3413a58795d0330d9d25e5daed377a5b1862cc0dbb8c2211e74a2540653373f455f33d6ba02be8f4da9ed6", 0x76}, {&(0x7f0000006300)="ae3105a5ebabd8611a78227986c00c168d7da251fadd18f9df78cbdcb9d83e57cfb3a1fccc62bc4a510f6078aa1b54a9cef5541b35ca63ddf50e3656bb1b6084fce729d30bdf82a28571ec9e3ab1ada71eac393fcabaab12a7d2ec1aa20e6e8dd04080b3ffa5e34774cae046f69b326e0e32739d846a37eb5ab216d900383ae7bbaecdb9cf92e32cc0625104fa78ad92b5d88f7f44b90e13ff9de0350b8c15bd20d993e0d714c522a1e51ab0", 0xac}, {&(0x7f00000063c0)="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", 0x1000}], 0x5, &(0x7f0000007440)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0xa6}}], 0x30}}], 0x5, 0x20000000) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:35:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) [ 1786.377410][T17742] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1786.402756][T17744] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="040000000a0a0102"], 0x118}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0xffea) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="b80000001e0000042abd700003dcdf25070000009d98061591d2b60f6a04b88d964e4b18ea92466652c5b5ada347bb5f88b838fb2d716143da3730d87750019cae40f00caf2b8857b683633ba6e21cfe496ec8848709000000ed1f6dacd6d3d854bb9480080000007673e9d9560a5136b6a77d3eb6494524600cf30e2a9bd3842b06990f06f4", @ANYRES32=0x0, @ANYBLOB="0000040010000000900034801400350069705f7674693000000000000000000014003500000000000000000000000000000000001400350076657468315f746f5f626f6e640000001400350073797a6b616c6c657231000000000000140035007663616e300000000000000000000000140035006d6163766c616e3000000000000000001400350076657468305f746f5f7465616d0000000800040007000000"], 0xb8}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000540)={&(0x7f0000000880)={0x2f0, 0x0, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0xffffffbf, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}]}]}, 0x2f0}, 0x1, 0x0, 0x0, 0x2}, 0x8010) [ 1786.453740][T17750] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) times(&(0x7f0000000080)) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], 0x118}, 0x1, 0x0, 0x0, 0x24048895}, 0x801) 14:35:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup2(r0, r0) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000000)={0x3d, "56c5404b74050b6ead911bc9ac091ee8507240028a99c7a5c8fc11fb23580623695f810e7df678cbc54d53e93f1e689e15c8a7b640ce47a6a49dfb3654bacf2d6aab297066121ab6571b3b6f0d1c82e5a4ec6e00a83e007ac2bbcf8e1c9c88b33c0c55f2769f903f16dd45ba77f154789f6413210c96e7a09ae68d3e26916ae9"}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000000c0)=0x2) 14:35:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/hci\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800b700", @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf250200000014000100ff010000000000000000000000000001"], 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x800) [ 1789.183457][T17767] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1789.193707][T17767] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:15 executing program 3: sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ustat(0x4, &(0x7f0000000080)) write$P9_RWALK(r1, &(0x7f0000000000)={0x23, 0x6f, 0x1, {0x2, [{0x4, 0x0, 0x7}, {0x8, 0x4, 0x4}]}}, 0x23) 14:35:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:15 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:35:15 executing program 3: setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x80}, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRESDEC=r0], 0x118}}, 0x0) 14:35:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:15 executing program 3: sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:35:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) clone(0x0, &(0x7f0000001240)="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", &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000240)="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") [ 1789.503819][T17796] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1789.517833][T17796] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:18 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open_tree(r4, &(0x7f0000000240)='./file0\x00', 0x1000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x4e22, @multicast2}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="02aa084ba201000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x83, &(0x7f00000000c0)=@assoc_value={r6}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000000)={r6, 0x5}, &(0x7f0000000180)=0x8) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x12) sendmsg$NFT_MSG_GETSET(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[], 0x118}, 0x1, 0x0, 0x0, 0x800}, 0x800) 14:35:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="180175a251fc3ee06ebedbdda9660c879a18d6aea8d217d4e5ea2f62de4287ed84766eb058ba0977f27dd98bf9193d856a850c5df78bb2e0247092a629d593aaaf65bbdee49ea1a06167178d5d3fdb305d2b40d5fe5b3119b34f7a2f00"/104], 0x118}}, 0x0) 14:35:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:18 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 14:35:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000a0a0102"], 0x118}}, 0x0) 14:35:18 executing program 3: ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000000)={0x1, 0x4, 0xfffffffc, 0x4, 'syz1\x00', 0x8}) r0 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@tipc, &(0x7f0000000100)=0x80, 0x80000) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000240)={0x67, 0x219, [], [@generic={0x2, 0xa6, "e89c419c11dbbbe3b38d83a919be210064465a57df6cb4323830c531a8e5073fed42e612e78b7e9c5f5ea0cb21a05ccca5117d2b1f104519fdf6252304256d9fc274c3de55693dde5fe68214837316e4ec42370eb95b96cb760c055db244c683e0690c441ed06571850ccca42e2dc7518319da2d0a02136d28e31891a63ac3e1d8300781d658a66fc9c9482a994bcd50fa1a6714335570834ce55829358c0fe89b019e5c21bc"}, @generic={0x3f, 0x1000, "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"}, @jumbo={0xc2, 0x4, 0x4}, @hao={0xc9, 0x10, @mcast1}, @pad1, @enc_lim={0x4, 0x1, 0x6}]}, 0x10d0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0x118}}, 0x0) 14:35:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap$snddsp_status(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x12, 0xffffffffffffffff, 0x82000000) r1 = pidfd_open(0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)={0x0, 0x15, "1967b4285bc81d6d27c577133d0d470348d2a2104a"}) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFNL_MSG_COMPAT_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0xb, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}, @NFTA_COMPAT_NAME={0x7, 0x1, '+}\x00'}, @NFTA_COMPAT_NAME={0xd, 0x1, '+}/^@Z-.\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x24044800}, 0x8001) 14:35:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1795.178028][T17847] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1795.190197][T17849] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:21 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000180)={0x1, 0x1, 0x1000, 0xe, &(0x7f0000000000)="c22ecbb33e81faf13b205e9583a6", 0x48, 0x0, &(0x7f0000000100)="a3f42a82497fbbadb75dbed4f78629c56ff6bb71bdd23b2e9851a1cebbb022e7474e28475aeb1a07152937e33f4a431a220b0df7dbcb92ae8d33d189a9ac0f26b94761839dc43296"}) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYRESHEX], 0x118}}, 0x0) 14:35:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 14:35:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x2, 0x3, 0x6) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDCTL_TMR_SOURCE(r2, 0xc0045406) ioctl$VIDIOC_TRY_ENCODER_CMD(r8, 0xc028564e, &(0x7f00000002c0)={0x0, 0x0, [0x6, 0x4, 0x1ff, 0x7, 0x3, 0x7fff, 0x400, 0x3]}) sendmsg$NL80211_CMD_SET_WOWLAN(r4, &(0x7f0000008b80)={0x0, 0x0, &(0x7f0000008b40)={&(0x7f0000001800)=ANY=[@ANYBLOB="01000000", @ANYRES16=r5, @ANYBLOB="010000000000000000004a000000080001004600000008000300", @ANYRES32=r6, @ANYBLOB="0c0099000000000000000000"], 0x30}}, 0x0) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xc4, r9, 0x300, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6}, @NL80211_ATTR_STA_VLAN={0x8}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x95, 0xac, "b097c276d36b45989d7d2bab96066961791621ad045adfd9a38728b3d4a42c6fc7608f44abcef2b98ae4bfa68511d6efadcdaa15858be63a15b4be2b078fb17bd5657786e085d7479d94864cd013d511d4ef7176871638f74661986d02edd965d6011fbcc72e8d6f105d22d89659f50798161dedc0ac071fd517f2c7417437df63f789af148d00ac34ef080dbea1e734c2"}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4000040}, 0x2404c041) ioctl$BTRFS_IOC_BALANCE(r2, 0x5000940c, 0x0) 14:35:21 executing program 3: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f00000001c0)) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x3, 0x8002) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000280)=0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x40, 0xaa, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0xfffffffffffffffd, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x2, 0x0, &(0x7f0000000200), 0x2, &(0x7f0000000580)) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000000), 0xe}, 0x4, 0x0, 0x0, 0x8, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x8, 0x4, 0x0, @dev}, 0x10) sendmmsg(r2, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r2, &(0x7f0000001800)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00003f00}, 0x800}, {{&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000000380)=""/215, 0xd7}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000480)=""/66, 0x42}, {&(0x7f0000000500)=""/77, 0x4d}, {&(0x7f0000000680)=""/76, 0x4c}], 0x6}, 0x8000}], 0x2, 0x2, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r4, 0x8008551d, &(0x7f00000001c0)=ANY=[@ANYBLOB="14550000f283e86e2b470fb0030d8401860b0b86020c07880604890b8784018a0e890b"]) [ 1795.549663][T17878] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1795.566933][T17878] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast}) r3 = dup(r0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80002, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x14, 0x17, {0x1e, 0x0, @l2={'ib', 0x3a, 'lo\x00'}}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000000) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) sendmsg$NFT_MSG_GETSET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0x118}}, 0x1000) 14:35:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFNL_MSG_CTHELPER_GET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xbc, 0x1, 0x9, 0x201, 0x0, 0x0, {0xc, 0x0, 0x5}, [@NFCTH_TUPLE={0x78, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, {0x14, 0x4, @private2}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}]}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x9}}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x4}]}, 0xbc}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040000) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:35:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000000)) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) [ 1796.483319][T17890] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1796.519646][T17893] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1796.529884][T17894] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:24 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x800}, 0x0) 14:35:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1798.264047][T17899] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1798.274492][T17901] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:24 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000240)={0x1, 0x0, "8a5a8e1c0b83c4d5e1f8b6fb71f613fa7c53c63a5632f4670a21d63be9e5f5c03b6a6ce49b93edb0a7b26f1ca3ac0000be9a4f17fb289f701e1476fb4dfebdfbe49d5419d42ad03254b02d16c9684cf4ee58c34f58695efec52b0e36e3568bd4c61bebb2c782c33b58147e62b477ea706d9a8248f1cc301f02cc695c2083da9b2004328efe3aa31a82ec15fa6c2a831bce3c3a3cca19bc5aa47fc5770664f554e1099870043615abd7206ae2a78ad33b45b92e6b1f9c6ff27ae3c1c2e89e223eb7dc4a67df9e811877f58093993dd90796b2b95c6d9d8f9f52cb818788e2c4604fdf9d328b0a1ac301ec064419deb5e6fbc1fc6ef4e822b0"}, 0x100, r0) ptrace$cont(0x1, 0x0, 0x100000000, 0x100000001) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000000c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0x118}, 0x1, 0x0, 0x0, 0x40}, 0x0) 14:35:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 14:35:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:24 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x118}, 0x1, 0x0, 0x0, 0x24000890}, 0x4000) 14:35:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x408000, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) [ 1798.660120][T17937] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="8c0004000a0a01faffffff11ca1ffb36fb02"], 0x118}}, 0x0) 14:35:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:35:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:35:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x10000, 0x0) dup2(r1, r2) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:35:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:35:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) [ 1801.572345][T17962] __nla_validate_parse: 1 callbacks suppressed [ 1801.572430][T17962] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:35:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1801.620455][T17969] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x40) syz_mount_image$gfs2meta(&(0x7f0000000000)='gfs2meta\x00', &(0x7f00000001c0)='./file0\x00', 0x95, 0x2, &(0x7f0000000180)=[{&(0x7f0000000100)="98dfd846209f78a9a8e4eea3cd0adfd2cc7fad91cc24b6795a42e255a225629a0b49ecee49de2f530d80fe3c9e1165b388e65d40b3c9c9d694ca54b1cb29", 0x3e}, {&(0x7f0000000140)="feaa4d66ea0fc7399653a099bbe5c0540951190ec9ba85", 0x17, 0x8}], 0x2280080, &(0x7f0000000240)={[{}], [{@euid_gt={'euid>'}}, {@subj_type={'subj_type', 0x3d, ')\'^#,^[)'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x64, 0x33, 0x39, 0x32, 0x5f, 0x63, 0x35], 0x2d, [0x56, 0x37, 0x66, 0x66], 0x2d, [0x30, 0x32, 0x64, 0x35], 0x2d, [0x62, 0x38, 0x7, 0x66], 0x2d, [0x0, 0x38, 0x38, 0x34, 0x66, 0x64, 0x37, 0x36]}}}]}) 14:35:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1804.294320][T17985] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1804.353411][T17985] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) recvmsg$can_bcm(r1, &(0x7f0000000380)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f0000000180)=""/89, 0x59}], 0x2, &(0x7f0000000280)=""/209, 0xd1}, 0x10102) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:35:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000000)={0x53, 0x6, 0x1, {0x1, 0x4}, {0x0, 0xfffb}, @ramp={0x8, 0x3, {0x8, 0x1, 0x6, 0x6}}}) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) [ 1804.591378][T18007] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305f381e35f3a", 0xa}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:35:31 executing program 3: ptrace$setsig(0x4203, 0x0, 0x42b83d3f, &(0x7f0000000000)={0x15, 0xa, 0x9}) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) [ 1804.648320][T18016] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1804.658742][T18017] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1804.716814][T18025] ptrace attach of "/root/syz-executor.5"[18023] was attempted by "/root/syz-executor.5"[18025] 14:35:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syncfs(r0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a080102"], 0x118}}, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080)='l2tp\x00') r2 = getegid() mount$fuseblk(&(0x7f0000000340)='/dev/loop0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuseblk\x00', 0x10000, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xb000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@smackfshat={'smackfshat', 0x3d, 'l2tp\x00'}}, {@obj_type={'obj_type', 0x3d, 'nl80211\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'nl80211\x00'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@subj_user={'subj_user', 0x3d, ':#\'\'*'}}]}}) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000014) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x0, 0x1, 0x70bd29, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x80, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r3 = dup2(r0, r0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640)='nl80211\x00') sendmsg$NL80211_CMD_START_NAN(r3, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000328bd7000fcdbdf25730000dcefb31e39d4bf0bc01aa8000c009900ff010000060f00000500ee008d0000000500ee0008"], 0x38}, 0x1, 0x0, 0x0, 0x24000040}, 0x800) 14:35:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="310c0000000800002bcc3b63b19c1248d8acb7645a0659fe5f60d3c79d02f6517333c3e89666c8c5ea5a3f45ec19c8f050487aae649b4dad5f924b3939400e959e8f1e328a41e56f58e1567fba6782c13f5093a4a19e3a88af"], 0x118}}, 0x8001) [ 1807.349100][T18042] ptrace attach of "/root/syz-executor.5"[18039] was attempted by "/root/syz-executor.5"[18042] 14:35:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x80000000, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0x0, 0x7, 0x101, 0x0, 0x0, {0x5}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x4}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x4}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x20008000}, 0x800) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0x118}, 0x1, 0x0, 0x0, 0x4}, 0x40) 14:35:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1807.606023][T18053] ptrace attach of "/root/syz-executor.5"[18052] was attempted by "/root/syz-executor.5"[18053] 14:35:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r6, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) r9 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000080)=[0x3, 0x8]) 14:35:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="6e912a9a44fe118f00000000"], 0x118}}, 0x0) 14:35:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$NBD_SET_SOCK(r2, 0xab00, 0xffffffffffffffff) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) [ 1807.788763][T18076] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x200080, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x150c, r2, 0x400, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x4, 0x25}}}}, [@NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_SCAN_SSIDS={0x40, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_SSIDS={0xa0, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0x22, 0x0, @random="72df268cb65befcafdcd3c5c72390cf6c9f44605a0a288f7568212ed0ca7"}, {0x22, 0x0, @random="8312b724193a3d4d148b42bd6afd123100684e4e3f9da737512589488ba8"}, {0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x8}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1400, 0x7d, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x23, 0x3, "a3f82fb1c90baa97391afbf94fdc0d16cedd2a15bf61f751704112de359eed"}, @NL80211_BAND_6GHZ={0x5d, 0x3, "a956bcad75f03798b7c0d992dce10479b0a545c112307785053d258d08a2a41c2e58cce543e80d355cdc8b7f170df31ae86773742609abf21ba83f0630c3ce80216fad6dbafbb208a03f38348dd8434a481be1086d4167c48e"}, @NL80211_BAND_60GHZ={0x1004, 0x2, "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"}, @NL80211_BAND_6GHZ={0x88, 0x3, "cb993a1b9512d018fa8ceceebf3b5e12784d961da488ffd7edb5888adf751650dfc973ff2bc1e5e17e8a6da0483822a1c7806b5e5700a0566f59e05995b669254879ddb7b616a3c60485724196b1334a101fbf0fe21c798a6272e72c0263543a66e10663ebe0bdf6f7b3efadcb32de1db3af1958785f0fe74d72b0f3ac27dff04e1e1292"}, @NL80211_BAND_60GHZ={0xb3, 0x2, "4b3db88b459e97b08d56128dc6f79bcaa4262b6b2346c79dbd9f75a973a2bc86c8768643cbced5999cbb9bd3c3444af993faa24184389d524b49f2ed7290f4add5e7a2c039121db0ebbaaa42346d47fcd5dca7dea2f4aee2b094ce5f94559a4375527349c74146172f03de0b5031f76aae182f6960085cda27ebd9c08187b1a3e2f2bedb37ab8134a09b34d64579b1d61a78000014bae13d0f1a26f038cc4d0267822230414ca47affd82466ed3c2b"}, @NL80211_BAND_2GHZ={0x4b, 0x0, "05fc52a3ee32b30f63a5a4b0b74b9374768844ac7b677d2aafdbec5f07d94111903f7c6267e4688ecafb543404ea11e09b2d93777c4eb29625c66241e5d3fd81226789b7615213"}, @NL80211_BAND_5GHZ={0x4b, 0x1, "035f9eb97adf4c6d411cdd65fac0877f5ca7b1629171bbce5e872a2511888249727fc6040b012a5bd1c384fd11f21366a0699f1896f8b7e106175fae98bc6e8c6b37e4a30b8f5c"}, @NL80211_BAND_6GHZ={0xd5, 0x3, "3e9ae974b5acfed79b4be360eb291ba75239448d44ab0b0252e90cba2c84c03978971996a02b0535ba4082b4be96e4790de109f2c25e133f81b1a1bfab400f0abc35a700dd199c470560232d689dec47afe669441336310ae27029e4d319861496d0102363cc178face878f688dd636099bf26775ca4304dfb10596b96724d809e335b862a17400fc260428d3796243cc8db1f42385489ddd69907efe33f7c8083de13790061bf65a193a33e339415b03402891df69f49a3d2e70e61f36af212414facfe6c85e73357970284e5e2e2eb6c"}, @NL80211_BAND_2GHZ={0xc5, 0x0, "8150809debd7128d97f9b584acc7b92de51264163c8eb97bb0019fde987f8652c8b051304115feac2048b01ab44b2732c21e21623877e479d51d7c5374b95344af65f25e7127e3c4e54c7864b0b18a72a9c0f15fb52dce414602ef1d5c616e019fd176db567803e0dd0c08844b76fafc668acba48e323b34bde0a3d86839f0364c33c00a6661d5e5e91c8b8d47e607e414bb773f897929b3ca89e94459eaa5132ebeafc78447bad4ce0fb2ef90d765010a74e7ea1aec1e23f16290f137bed59974"}]}]}, 0x150c}, 0x1, 0x0, 0x0, 0x2000051}, 0x8044) semget(0x2, 0x3, 0x420) r3 = openat(0xffffffffffffff9c, &(0x7f00000028c0)='./file0\x00', 0x40, 0x11a) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f0000002900)={0x5, 0xd94}) read$usbmon(r1, &(0x7f00000018c0)=""/4096, 0x1000) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001780)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_IBSS(r1, &(0x7f0000001880)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001840)={&(0x7f00000017c0)={0x44, r4, 0x300, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FREQ_FIXED={0x4}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_HIDDEN_SSID={0xa, 0x7e, @default_ap_ssid}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x8000}]}, 0x44}}, 0x20000900) 14:35:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r6, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) r9 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000080)=[0x3, 0x8]) 14:35:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="f7a274e70987d573"], 0x118}}, 0x0) openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x100) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000140)=[@in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e24, 0xfffffffa, @loopback, 0x101}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x8000, @private0, 0x4}, @in6={0xa, 0x4e22, 0x89e, @private0, 0x400}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3a}}], 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0x15, 0x6, 0x9) accept$packet(r3, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000018c0)=0x14) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x83, &(0x7f00000000c0)=@assoc_value={r2}, 0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r2, 0x8}, &(0x7f0000000100)=0x8) socket$nl_rdma(0x10, 0x3, 0x14) 14:35:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000080)=0xe) 14:35:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="18010000ef0a0102764f9d9042c86bb5ef2eea09765099797819154dfb3ada368696b17c3a856c67cc44da691d6fb0f65bbd0fe315480f5291a4cf887cb07bb02572f0731c99ada67603a5a18130e83b343b17e1fbdf3f5b706accd240b3d70be6290db7e66a65995a624055b8393255ef827a0e894c763e91d89cb7b3d099070d6de73ae136b1b7c05db8519971dc80484be339bf889f694721d0fd95852e1196840e8e2b2aa251a5490dd2aa7ebabfea1df81345e5a50c06ff8f776d"], 0x118}}, 0x0) [ 1810.668566][T18096] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1810.683354][T18096] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) 14:35:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1d1042, 0x0) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3fb, 0x4, 0x70bd25, 0x25dfdbfd, "", ["", "", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x810}, 0x20480d4) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) [ 1810.800482][T18112] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1810.811171][T18112] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="08014530c6340102", @ANYRES32, @ANYRESHEX=r0], 0x118}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10) connect(r2, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x4, 0x2, 0x0, 0x2, {0xa, 0x4e20, 0x84, @private0={0xfc, 0x0, [], 0x1}, 0x326c}}}, 0x80) [ 1810.869011][T18119] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32], 0x118}}, 0x20000011) 14:35:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r6, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) r9 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000080)=[0x3, 0x8]) 14:35:39 executing program 3: ioctl$CHAR_RAW_BSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000000)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x118}}, 0x4000) 14:35:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x40c0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x88, 0x0, 0x1, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={[], [], @loopback}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2f, 0x7, 'system_u:object_r:devicekit_disk_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_virt_wifi\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x64010100}]}, 0x88}, 0x1, 0x0, 0x0, 0x50}, 0x44004) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$HIDIOCGRDESCSIZE(r5, 0x80044801, &(0x7f0000000000)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x81) ioctl$KDSKBMETA(r6, 0x4b63, &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r7) socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYRES64, @ANYRESHEX=r0, @ANYRESDEC=r8], 0x118}}, 0x48880) 14:35:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) fanotify_mark(r1, 0x0, 0x1029, 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="990400f202000000"], 0x118}}, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000100)={0x0, @bt={0x6, 0x2, 0x2, 0x1, 0x0, 0x101, 0x400000, 0x800, 0x7, 0x1f, 0x2, 0x7, 0x9, 0x80, 0xb, 0x24, {0x0, 0x8}, 0x7, 0x9}}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f00000001c0)=0x1) 14:35:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r6, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) r9 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 14:35:40 executing program 3: r0 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xa0, r0, 0x200, 0x70bd25, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x1}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x10}, 0x4880) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000000)={0x0, 0x6, 0xfffffff9}) r4 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x100) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x0, r4, 0xfffffff8, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={0x0, 0x1, 0xffffffffffffffff, 0x7fffffff, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, &(0x7f0000000180)={0x0, 0x3, 0x5}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000100)) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000380)={0x0, 0x0, r6, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, 0x2, 0x6, 0x3, 0x0, 0x0, {0x1}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x200080c0}, 0x8000) sendmsg$NFT_MSG_GETSET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r7 = fsmount(r3, 0x1, 0x86) ioctl$NBD_DISCONNECT(r7, 0xab08) 14:35:40 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000001640)='/dev/input/mice\x00', 0x1) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYRES32], 0x118}, 0x1, 0x0, 0x0, 0x4091}, 0x0) [ 1814.279926][T18166] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1814.302053][T18166] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x6f, 0x8, {0xffffffffffffffff}, {0xee00}, 0xfff, 0x9}) ptrace$setregset(0x4205, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000100)="a3b0960d9a540fed9492da16862820ba9de6e5156368b2cdd2598c3b6d5825bdccc32fc36f7e51ef5e6b86f80dea10ac3414a2531b5bddeef81216a85deea61a4f8111ba052f9a8a51cda09ecd8c59768d6c484065bfb5e352c8b5a02b54fd7408a791284b711afdd32a4a150e2dcf877b19f99a88a33aad534b840bc23735203ddf2a99e943eea62a807c65e26a57d181f3e46c9fd64d586febe2dc4b020d02ae6e7f3082ac9e0d0ae5a2972cac2cb5bfe409bccb684f44ecc95d3c7ee53a926add4d5d700e5acf7ade4c794ba1c2ca27f9311a24fbd02f3eb96eeed9919f14a7ee41983fb0065ef0b0dd858da05423363a756eb7f7", 0xf6}) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x80}, 0x20004840) [ 1814.405497][T18175] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x80, 0x80, 0x5, 0x3, {{0xf, 0x4, 0x1, 0x5, 0x3c, 0x65, 0x0, 0x7, 0x4, 0x0, @rand_addr=0x64010100, @local, {[@rr={0x7, 0xb, 0x30, [@multicast2, @loopback]}, @generic={0x82, 0x7, "244a0741ae"}, @timestamp={0x44, 0x14, 0xce, 0x0, 0x6, [0x1, 0x5, 0x9, 0x5]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000240)={'syztnl0\x00', r2, 0x7800, 0x8, 0xffff, 0x9, {{0x5, 0x4, 0x2, 0xd, 0x14, 0x68, 0x0, 0xc4, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x2b}, @empty}}}}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) r3 = socket(0x2, 0x3, 0x6) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$IPVS_CMD_ZERO(r8, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x90, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffa}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x1aec7c6d454e0ab1}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffff9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x90}, 0x1, 0x0, 0x0, 0x8000}, 0x4000854) sendmsg$NL80211_CMD_SET_WOWLAN(r4, &(0x7f0000008b80)={0x0, 0x0, &(0x7f0000008b40)={&(0x7f0000001800)={0x30, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x46}, @val={0x8, 0x3, r6}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x14, r5, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000004) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) 14:35:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r6, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) dup(r3) [ 1816.432618][T18182] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f0000000000)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r0, 0x8000, 0x3f, 0x7}) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r2, 0x40184152, &(0x7f0000000700)={0x0, &(0x7f00000006c0)=[&(0x7f0000000100)="2b6c469b2f04da33e170df3690e3f5f837a5e83bc88bd35ac8c7ffb978d118d11433d0d9c3ccad5cc5da06e2c1c5ec0cba02a9bfc7e1315aaa2e96023a51777000f5b4befb00e12614e62a4ed4a5146ad829528f4c9baa8c6a06864c06629f6d0fbc085a2856648a286aea6bd1e4b691e0dc98757b9ba2eab30352fdd60badedbc3bab744b277b7fea5ed3abf7", &(0x7f00000001c0)="9af53c8c49d22edf7d28227c68f610d861443164877030a6c31b7566fd0746b691886535f039dfae5ca110e489a3c3f74a77b1bceacc0e207af82cf966d21adb38d7fe24d4e06e46b8e94a304a59776b873188e2c08ced9203f4efeeae4f22945a78a8181dc8826684425546341a70f5dfa62edf5f30c469ff9b098a2bb8740df3168f7b825f51a0b74eb133fe2360ba47de98c2337126a27db309b5f8f1ba81221bcee5fe2ce49c51f388750229896c9443ffd1533ddd56d7573d3f2c4fa8910152554ec0c85bb2c9f2f7bf14dba9e56e35e115a10803fee77b8d", &(0x7f00000002c0)="59ce626034537677c295da043d3163194041d00390f51d360ace3fcfcdd6ecda2068fa6e9e7d6138ae2578bc37761788561b23bd1e1ca03f5b5d324bb95e038526a6589d26681ff8b48c22839aac3e9bf868a5b626b2d93888560d7cf40c2a98fba0d2abb3abd1490fb7a0a921a3a1af51116bc5641da0ac35a2f66fb61bad3e9c90b059ab1258e6d8b8b23367a9c6df86d4f2dbe5d925013e5e7e2be9de2c7ec9cda3b455e54c8bdcc5ea6bba94cb9c4278c4de569adea80c1e5a184ef526489a6c06b1e3658113f448", &(0x7f00000003c0)="8216c6097ee0833426ae7776748820f64cbe4f0da73b8623130379052b063017dcb7d3dcd4fe48ed85529afb3c23a82887a309d3e18b5771aaa07562cbc6e73506678c9c6e02323af81f24d38870e0e6fff75025fa4479c257d64f91b5fdd5d10728644a215eae2c997d435fc20ca30b0b1b2cf32f44754c6ab84accc563b998c0c1a3f3356261f74ebe8383ddf70cef6b91f42dd8443d2ba14d7c223c595f7acb17d785b7dc7e1ffed24cc9f9157454193fac8beb06a852aeefce8cb2ca18eb1f12bd16fed5e2be3382888c9cd4289a65b00c95175c5711d61304b09aff8e0f7381f0751345547140", &(0x7f00000004c0)="57be17642166e5777a4fc3032a7b4cefc507a548994f9eb4229e8f94a3f26ea6f83d31e697d2395a63f7889c52ef30ddfab7de672a672e45ed4e6a658243c7e304c60fbb43942ce1cfea8dc36fe5a43bb38ad4db27aa03c41bbf231aa41bc617e07ecf9c2df8210dbe8ad118382404c1257bf855e82981bcba3d434b1695b4a6690c3b14fe56d1f54b73b4fded62d8f528b503621fe6c5126264268aee72bb49b440f14f0b8a1b72569697", &(0x7f0000000580)="81195de1353d5385d135fddbd43349d8584a610b263567a5384080267afb8137817242b64ceb6ca295c7aea924c4f2ee4b2bbffd8477efa438646f9bfb4ade2c3715ae206fd5d800a9743ace8209ea0e9b5bbd17f49b390c7d9048bef900428ac1124c00dfbb06d0b8f7e240b4e0a3d7b0efe534bdc0f5d7ec2e657c49a1ec8acb26592ba4dbad77590d4c3fdc62c1532d8f5b25a1bc93a830fce8a2a34fb20d208ccd6f81a386dfd7a5a6ae4028a118f2c295cbd9ca026f4570cacda2899bb8100f5ad86852", &(0x7f0000000680)="a0"]}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) sendmsg$NFT_MSG_GETSET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0x118}}, 0x4080) 14:35:43 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:35:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:43 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2c201, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000040)='[[*]\x00', &(0x7f0000000080)="268a7488d08fd5939909893ec73434a3abcc79779e2c09986a0d4836dc2e5eccef599e2e521479c597447ee5c257079995c50c23f68e7d3dba108f7896443893986dc7d0934a0962af140cba0fdb66cd2e81b978f924576630d7b41c92c0b31191346dc6def7d28f53ba27c155f9fab25ba3fd8a9262d0726362b9fe20ddd2b3eeea03473b7d24751667fb81c60a8cb90c706aa450b275c6", 0x98) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000000)={0x1, 0xf4, @value=0x2}) socket$nl_netfilter(0x10, 0x3, 0xc) 14:35:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_init_net_socket$ax25(0x3, 0x7, 0xca) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000180)={0x6, 'syzkaller0\x00', {0x2}, 0x8}) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x170, r5, 0xf, 0x0, 0x0, {{}, {0x0, 0x3}}}, 0x3f0}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r5, 0x400, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RELOAD_REGDB(r6, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x14, 0x0, 0x300, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040}, 0x10) 14:35:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000080)={0xe4, 0x29, 0x2, {0xd7, [{{0x40, 0x0, 0x5}, 0x20, 0x5f, 0x7, './file0'}, {{0x1, 0x3, 0x8}, 0x9, 0x5, 0x7, './file0'}, {{0x4, 0x3, 0x5}, 0x4, 0x7, 0x7, './file0'}, {{0x80, 0x3, 0x5}, 0x8, 0x20, 0x7, './file0'}, {{0x0, 0x4, 0x8}, 0x7, 0x0, 0x7, './file0'}, {{0x10}, 0x8000, 0x6, 0x7, './file0'}, {{0x4, 0x2, 0x6}, 0x8, 0x80, 0x7, './file0'}]}}, 0xe4) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="180100000a0a010229b62c4409007601f82c3d8272b6ffecf068bd548cd2de39aeccbecc9be6eeff9c31dfceb1e1201816b5ffa30ed778363faaf93ecfb978798b3d97666849f661eb0ddcfef2bb638bfcbe882cdb4bd2ce914a872171dfc698c664b9f8e92927fa1b6a41c609b62da3a7004b39edcc9934751f84096cc02c19ea118bc0f094dcfeaf6c335668d065bd6c5e21a7008bebbf036b0fdfa3a3169dc28e53186f6a4563a8b16ca3d06d132cc358d3267378a0955b51bf45934b5264f2867825c584ae3dec690720371945dca92608517bf26c31df65488fe42244d3eb406fda1983e959094c46bfa6"], 0x118}}, 0x0) [ 1816.962964][T18221] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1816.985006][T18221] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100410a0a0102"], 0x118}}, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x34, 0x1, 0x6, 0x201, 0x0, 0x0, {0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x1) getresuid(&(0x7f0000002880)=0x0, &(0x7f00000028c0), &(0x7f0000002900)) fstat(r0, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0x9, &(0x7f0000002780)=[{&(0x7f00000002c0)="b01326dcfba169f41ba802e4d51d832b13223a82047c9b0d058158db2c6ad3fcacb4d5946ad88f1e4562226847a61912f6788d35f89ac3fbd1ca68020f021d39a04df3bfb63828659fc9373a9f906253e723b9a265cd063e1860e5a8fb61f3c7dbaa1a948749b278d7fee3a31e4e9ff45956d3d4b0b72df29d5547497cc7f38950b307fb9318a5ffa46db7aa47d38d317968e9c51b", 0x95, 0xc}, {&(0x7f0000000380)="a238fd9162ca8e609a440605fef1eb26de0356a1e4a8e78eac57da07940f30b013bb622aac491a5e2bc6d00018d0d2aa2d575c02a212491b33fc13f7596cd354d87cc5a7a140906935afeb1cb885d7098045fa9db799cfe2bb8a4a997db5880a5f7a714f6bc5e2b21464f4d342213957e655fa8900d093cc2b4d78f5a12be76afdd30c4d6aa2ed82ea189332e0127300f7fc5cbdd6842cab5f12c3b59fcb0736cafc", 0xa2, 0x4}, {&(0x7f0000000440)="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", 0x1000, 0x1}, {&(0x7f0000001440)="a66715a48b3b41818565eefac8314c0f695d7680eaebf18e65d950d67a2762afb144c5ddaa4effaccfc5b08740a75f88ca2a48db02de921b2e675bb5ecc5f073cf83cfb8fd9a9fa13616614cda3c007ea22836fa81b0558ebff73304a6352da6e99ec4d3b126ecb1cf62b32d57b4a4f496c71c2cbe32e2af0c111778b6c7e03750c48eddd14b5891252c2f0e28e2da53952cf7506c589fe3b5bea017272a42112527cfba85b647ed9c62887b75b9022f2d2cab06e10825a58a92c58d73d5592111da214def2b26292a5ca8b8", 0xcc, 0x1}, {&(0x7f0000001540)="103936df6b9eee7b78f11bfbfe2175afecf4535cfbb4e1035ba47dfa55d76b41ea0b2e8e003fd0220b382f5f5891b2cd99e601a7fcbd87372d23531eb25d5de8040ce6970656dd36371733afd75e0d2035cad210c983323d5e", 0x59, 0x2f25}, {&(0x7f00000015c0)="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", 0x1000, 0x4}, {&(0x7f00000025c0)="0ebc4abef613102a92e02a0a5f1e06428d817002c048fe072bfb5a5cfd4f4fef732f33d5ea49c62ef7ecdf8c474bb372a4344a6161e2dae3ed91b72edf606d9cb9818fd224e01e73383fe7a475667f412e251bf29205247bf531b6a253a21145977472892ee4b429b09186e5b56cc2d4ca43421c48ee950b3649b9b1836e322956f5dd16758a502d8d2a5d2610dee8bd714c5b4f1c9440444e5c5533f0", 0x9d, 0x9a2d}, {&(0x7f0000002680)="4a5a90d2fbaab7e16097a1ee4b23cbf040cce4357cdf08e6ba2373bdcbfb24f5d644329de7f0f67fc9c049bc47ea4ff2b9ab2a533c7edfff5c6df5c9227b6dd39aa9f935864204221766658aa7822da208cbcc32ae196f46d8628a6d681d15384ef67a8c2a011d1b713f82752ce3a9fc3726e1f62d20fda98a891b3b430a5dfa2df95ca72e7603ca3723b0193dd7bff1155d2b4ac5d58a6cfce247fcdf0c47d50090a4add2f406c927b9bb4200564f20c08a4ca2adf65f", 0xb7, 0xbe}, {&(0x7f0000002740)="43bd93f245575ae69168a9d8e3737102068acfdf90c642af3247321d1c9173930c70a0377855b120ac27a1a9", 0x2c, 0x5}], 0x2200020, &(0x7f00000029c0)={[{@quiet='quiet'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@umask={'umask', 0x3d, 0x6}}], [{@euid_eq={'euid', 0x3d, 0xee01}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xf2]$!:$:'}}, {@uid_gt={'uid>', r3}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@fowner_lt={'fowner<', 0xee01}}]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) [ 1817.030645][T18228] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1817.060184][T18229] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18986efffabfb4a5725fda400100000a0a0102f81d5514fff7f0e7beb5ea5826ccb98d36ba5655810141d5337fac0088ab0e83bac29b5df942710f806aafcf7e7a9e902463", @ANYRES16=r0, @ANYRES64=r0], 0x118}}, 0x0) 14:35:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}, 0x1, 0x0, 0x0, 0x48015}, 0x40001) 14:35:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r6, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) dup(r3) 14:35:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:46 executing program 3: unlink(&(0x7f0000000080)='./file0\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 14:35:46 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:35:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:46 executing program 3: sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x360, 0x13, 0x200, 0x70bd2c, 0x25dfdbff, {0x11, 0x0, 0x3, 0x2, {0x4e21, 0x4e22, [0x40004000, 0x401, 0x7, 0x5], [0x120000, 0x80000000, 0x7], 0x0, [0x9, 0xff]}, 0x945, 0xffffff00}, [@INET_DIAG_REQ_BYTECODE={0xc7, 0x1, "4b4a23bc42061955f9bd315088dcd901c284e9f33d22737a9bb029b7006b3b7796331b3a2aaffe48e894f0e5c840045408e7a496ff0db808e2e1c3ccbe5dc376d3ec337a4ceabd0884444807455f7df1c6dd7b6ce29bb7c51a30dcecb4b036c92b7988a047cb75f1c97171749eaf19245e7ffa1cd968f1a790f34a9d5bba0c1c85db7de718947d4708a449276e1e6eff88f02fb7e5fd9a88f7258fd347a9504f683d176a9abf5f79b724cff090a0e798c76a4e17985e6163a669eefbda829dc2824953"}, @INET_DIAG_REQ_BYTECODE={0x6d, 0x1, "bc38a59e6b23f726b5e3c11d01920726b21b09db8bb81d0363e8771b174401a04457a0ffb33363769cc0548e13def97f6e16f40a3c36a858cbae2f52c8a64db4ecdab3e52bb1815887733f5eb78f2a19ec9f2a3063653ee7e7030a0ff811488da12b92506e6a35364b"}, @INET_DIAG_REQ_BYTECODE={0x93, 0x1, "8f4a72e8021e55034bf8cf624bea65dfd49c6ef98615b3447714c267f9f8eb45b392c803c9e1bc773337edfbd6916a3640b9c0004fc8bbfc7c478eff50993a7eb6ad1d9606b3348b9b10d50b9dbb69dc3c3cb4fed54871bd0cf5ca6d7727bc1b6199e6df6d3c33323d1c12d9594dec7f9f0e50d30d2d8dcdf8fd3d0de0fbe4231837bcb5e1fb4223928cf49648b4a2"}, @INET_DIAG_REQ_BYTECODE={0xcc, 0x1, "0958d34de27dbb5821ebe32b39d17082364b3b446a2ade551b29d90733b71627e2c1d818dc8b14ca242e31583b23d6da6fd9f489cf501a4cfa88b2e3f049e77733f050b9b6cde26417b5f25ec28adb311a3bd71eae58de124c86a80ed98a39056fd59091182f4d1b6b80e5521c86aee1a401ddedc0fba2f7d02263bebe9c4660ea34b3be8ad30714bb80e758ded3da309dd9ff8f9bd0056e134de403e5e351e0a3e27ffb1d2a2a1e490c05e66971c16c8a3f51309881b8af4fe12212a692e5d70a073d733fa6d518"}, @INET_DIAG_REQ_BYTECODE={0xc, 0x1, "735c98bf45aa406f"}, @INET_DIAG_REQ_BYTECODE={0x64, 0x1, "aaa02c3eeb2dfa10b889f574111307b07bfa048343f7b847809d85d955edae958aab5b64fa1fa0a28da8cdfe395b33a74aeac12cd425deafcbca964fd669f38775613f8ff036d32b74220fdbefa320ff9706febf773229162f4726d3299de655"}, @INET_DIAG_REQ_BYTECODE={0xc, 0x1, "a05fd8e6e978ad5e"}]}, 0x360}, 0x1, 0x0, 0x0, 0x40000}, 0x4040080) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) [ 1819.841433][T18256] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1819.869175][T18265] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1819.930355][T18269] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1819.957269][T18272] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.3'. 14:35:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r6, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) dup(r3) 14:35:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) setsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f00000003c0)={r5, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:35:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) setsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f00000003c0)={r5, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:35:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 14:35:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) setsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f00000003c0)={r5, 0x8, 0x40, "620616b24ba07ba0e7082f10ec8c01db70e4e8c6d091c61dbc755194fac9b37e370f1407bc9814105e0a48b51b57444ead667174300d35cbbe65e947b937641f"}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:35:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:49 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:35:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100), 0x800) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x83, &(0x7f00000001c0)=@int=0x7ff, 0x4) r7 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 14:35:50 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100), 0x800) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r5) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:35:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100), 0x800) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:35:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 14:35:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:52 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100), 0x800) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:35:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100), 0x800) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:35:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:35:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:35:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100), 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:35:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:35:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) 14:35:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:35:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:55 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff", 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:35:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:35:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x118}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:35:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:35:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:35:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:58 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff", 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:35:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:35:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:35:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:36:00 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:36:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:36:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) socket(0x10, 0x6, 0x5) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:36:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff", 0x3}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff13", 0x4}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff13", 0x4}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:03 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0008000800000003000000094f04003c00670000082f90780a010101ffffffff4404e65088093917eb7dd2499a4414d253e000000100000fffac1414aa0000ffff940401000000003d2ab3792cc22a5d3e42ef56673ff5dbdde6421c743b652e7a6bcdf0298410b3197b56035229bdecc461d3a6e970e45ab688620a135da271a724"]}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:36:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:36:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb000000000000000000", 0xc5}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1837.691892][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:36:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000140)={0x8008, 0x0, {0x56, 0x3, 0x7fff, {0x37, 0x2}, {0x5, 0x401}, @rumble={0x7, 0x8}}, {0x55, 0x3f, 0x3, {0x5, 0x3}, {0xf0d4, 0xfffe}, @ramp={0xc, 0x32, {0x624, 0x55e, 0xbf, 0x7fff}}}}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1838.054041][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 1838.132381][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:36:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000180)={0xa, 0x20004e22, 0x0, @loopback, 0x40}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r2, 0x8982, &(0x7f00000001c0)) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "d4c7010100", "442065238929350ade91900b51fc9534", "11a47ddd"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 14:36:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff13", 0x4}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1838.232450][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket(0x2, 0x3, 0x6) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WOWLAN(r4, &(0x7f0000008b80)={0x0, 0x0, &(0x7f0000008b40)={&(0x7f0000001800)={0x30, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x46}, @val={0x8, 0x3, r6}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, r5, 0x20, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x80, 0x56}}}}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xfffffffe}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x181e42c4}]}, 0x70}, 0x1, 0x0, 0x0, 0x20048804}, 0x80c4) [ 1838.330531][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:36:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, @xdp={0x2c, 0x9, 0x0, 0xa}, @vsock={0x28, 0x0, 0x2711, @host}, @phonet={0x23, 0x66, 0x0, 0x2}, 0x800, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)='bond0\x00', 0x8, 0x7fffffff, 0x2b2}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket(0x2, 0x3, 0x6) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WOWLAN(r4, &(0x7f0000008b80)={0x0, 0x0, &(0x7f0000008b40)={&(0x7f0000001800)={0x30, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x46}, @val={0x8, 0x3, r6}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, r5, 0x20, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x80, 0x56}}}}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xfffffffe}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x181e42c4}]}, 0x70}, 0x1, 0x0, 0x0, 0x20048804}, 0x80c4) 14:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r3 = socket(0x2, 0x3, 0x6) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WOWLAN(r4, &(0x7f0000008b80)={0x0, 0x0, &(0x7f0000008b40)={&(0x7f0000001800)={0x30, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x46}, @val={0x8, 0x3, r6}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, r5, 0x20, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x80, 0x56}}}}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xfffffffe}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x181e42c4}]}, 0x70}, 0x1, 0x0, 0x0, 0x20048804}, 0x80c4) [ 1838.489295][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:36:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xb839, 0x0, 0xfffffffffffffe5b) [ 1838.547311][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1838.613973][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:36:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a1f8", 0xffffffffffffffc1, 0xb341, 0x0, 0xfffffffffffffe5b) 14:36:07 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1841.087792][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:36:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "e9766160da3f00"}, 0x28) 14:36:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0xf000000, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) [ 1841.276914][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:36:07 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000200)={0x0, 0x6000, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180100000a0a0102"], 0x118}}, 0x0) [ 1841.338348][T18573] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:07 executing program 1 (fault-call:12 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1841.390192][T18575] netlink: 260 bytes leftover after parsing attributes in process `syz-executor.1'. 14:36:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:09 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:36:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:36:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:36:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, 0x0, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4), 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:36:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x4, 0x0) 14:36:13 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:36:14 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:36:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:16 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 14:36:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x21, 0x0) 14:36:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:36:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x3, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x1901, 0x0) 14:36:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:36:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:36:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x2000, 0x0) 14:36:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:36:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:36:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:36:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:36:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1859.566309][T18857] ptrace attach of "/root/syz-executor.3"[18856] was attempted by "/root/syz-executor.3"[18857] 14:36:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb00"/200, 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x4000, 0x0) 14:36:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 14:36:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1859.655903][T18866] ptrace attach of "/root/syz-executor.3"[18863] was attempted by "/root/syz-executor.3"[18866] 14:36:28 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:36:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 14:36:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1fffff1305f381e35f3a555e7c710400000000000000b1c89fd000321ea8e71a3a4163d6fe34fe5acf56e16ee0defeef120b12c4899d8ee4b73fabe2b9b51b4802a23e9c2e5e8e2ff19ada80068475abf311e6af314abe89b29227f552cd4e42e5a5229cc027fea9970227dd06a8d792427cb435cd7538bdb0326e6ed39ad807c1f16bdc930a6b9042f8950df161133a489e227a31203d433e3722ddea0419dd10d72e371fae5dec796e9117022c51f80bf35fe52bc508a889fb92bb", 0xbc}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 14:36:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)}], 0x4, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1862.632269][T18864] ================================================================== [ 1862.640345][T18864] BUG: KCSAN: data-race in __ptrace_unlink / syscall_exit_work [ 1862.647856][T18864] [ 1862.650169][T18864] write to 0xffff888091149028 of 4 bytes by task 18870 on cpu 0: [ 1862.657862][T18864] __ptrace_unlink+0x160/0x300 [ 1862.662606][T18864] __ptrace_detach+0x1b/0x1a0 [ 1862.667267][T18864] exit_ptrace+0x93/0x160 [ 1862.671584][T18864] do_exit+0x13d1/0x16c0 [ 1862.675836][T18864] do_group_exit+0xcb/0x180 [ 1862.680317][T18864] get_signal+0xe9f/0x1650 [ 1862.684727][T18864] arch_do_signal+0x25/0x270 [ 1862.689439][T18864] exit_to_user_mode_prepare+0x124/0x210 [ 1862.695043][T18864] syscall_exit_to_user_mode+0x16/0x30 [ 1862.700477][T18864] do_syscall_64+0x45/0x80 [ 1862.704870][T18864] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1862.710727][T18864] [ 1862.713029][T18864] read to 0xffff888091149028 of 4 bytes by task 18864 on cpu 1: [ 1862.720628][T18864] syscall_exit_work+0x7b/0x1d0 [ 1862.725451][T18864] syscall_exit_to_user_mode_prepare+0x2f/0x40 [ 1862.731572][T18864] syscall_exit_to_user_mode+0x9/0x30 [ 1862.736915][T18864] do_syscall_64+0x45/0x80 [ 1862.741301][T18864] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1862.747164][T18864] [ 1862.749466][T18864] Reported by Kernel Concurrency Sanitizer on: [ 1862.755597][T18864] CPU: 1 PID: 18864 Comm: syz-executor.1 Not tainted 5.9.0-rc7-syzkaller #0 [ 1862.764237][T18864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1862.774284][T18864] ================================================================== [ 1862.782315][T18864] Kernel panic - not syncing: panic_on_warn set ... [ 1862.788897][T18864] CPU: 1 PID: 18864 Comm: syz-executor.1 Not tainted 5.9.0-rc7-syzkaller #0 [ 1862.797550][T18864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1862.807575][T18864] Call Trace: [ 1862.810858][T18864] dump_stack+0x10f/0x19d [ 1862.815163][T18864] panic+0x207/0x64a [ 1862.819038][T18864] ? vprintk_emit+0x44a/0x4f0 [ 1862.823705][T18864] kcsan_report+0x684/0x690 [ 1862.828192][T18864] ? kcsan_setup_watchpoint+0x41e/0x4a0 [ 1862.833715][T18864] ? syscall_exit_work+0x7b/0x1d0 [ 1862.838711][T18864] ? syscall_exit_to_user_mode_prepare+0x2f/0x40 [ 1862.845016][T18864] ? syscall_exit_to_user_mode+0x9/0x30 [ 1862.850537][T18864] ? do_syscall_64+0x45/0x80 [ 1862.855097][T18864] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1862.861140][T18864] ? __send_signal+0x690/0x7d0 [ 1862.865879][T18864] kcsan_setup_watchpoint+0x41e/0x4a0 [ 1862.871232][T18864] syscall_exit_work+0x7b/0x1d0 [ 1862.876061][T18864] syscall_exit_to_user_mode_prepare+0x2f/0x40 [ 1862.882187][T18864] syscall_exit_to_user_mode+0x9/0x30 [ 1862.887555][T18864] do_syscall_64+0x45/0x80 [ 1862.891947][T18864] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1862.897814][T18864] RIP: 0033:0x0 [ 1862.901244][T18864] Code: Bad RIP value. [ 1862.905284][T18864] RSP: 002b:00007f6b237e0c58 EFLAGS: 00000246 ORIG_RAX: 00000000000000c8 [ 1862.913687][T18864] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1862.921635][T18864] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 14:36:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="1fffff1305", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1862.929612][T18864] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1862.937566][T18864] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1862.945522][T18864] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1862.954896][T18864] Kernel Offset: disabled [ 1862.959206][T18864] Rebooting in 86400 seconds..