en(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f00000001c0)=0xe8) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:08:59 executing program 2: syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:08:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xf5ffffff}, 0x1c) 12:08:59 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) ppoll(&(0x7f00000000c0), 0x200001af, &(0x7f0000000200)={r11, r12+30000000}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 346.380943] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:08:59 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x0) 12:08:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xaaaa0000}, 0x1c) [ 346.480879] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:08:59 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x25a, 0x0, &(0x7f00000050c0)={0x77359400}) 12:08:59 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080)={0x8}, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) 12:08:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x3}, 0x1c) 12:08:59 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:08:59 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000040)={0x0, 0xfffffffffffffff8, 0x106}) sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) [ 346.678497] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:00 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1cf, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:00 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r9, 0x4010ae74, &(0x7f00000001c0)={0x8, 0x4, 0xa2}) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x800, 0x0) write$P9_RVERSION(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="15000030302e757e00001f00000000000000000000"], 0x15) 12:09:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x10000000}, 0x1c) [ 346.948856] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:00 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000040)=""/46) 12:09:00 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) r7 = fcntl$getown(r6, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r8, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r7, 0x800, &(0x7f0000000600)=""/96) mq_timedsend(r8, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:00 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}}, [0x7, 0x2, 0x8, 0x3, 0x4, 0x3, 0x9, 0x101, 0x1, 0x5, 0x7, 0x3, 0x6, 0x9]}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={r1, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}}}, 0x84) r2 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) 12:09:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x40000}, 0x1c) 12:09:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfe80}, 0x1c) [ 347.217603] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:00 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x0) 12:09:00 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) close(r7) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37897132b075fbd537f6b14be2bd47e02270ef7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f7cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080ab9c3e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c700000000000000000000000000000073daf50de719a15b49fd256139f22c2fb83e52c47176876b6fe2480eb5549c26e804998d074e6193243272291521f3cc4fb29afb6ebd11c929af7da81bf2529f83a505858dce8337c4750ca0159e2180d956650f9897039ac5dccbb95998e49cfa8f36ef313bfd7c3fd56ffd3285ebeedf"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 347.309000] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:00 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xcc, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:00 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141602, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x1, @mcast1, 0x7}}, 0x7, 0x2, 0x1, 0x7, 0x69}, &(0x7f0000000140)=0x98) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x4}, 0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={r2, 0x400, 0x20, 0xffffffffffffffff, 0x3}, &(0x7f0000000240)=0x18) 12:09:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x91ffffff}, 0x1c) 12:09:00 executing program 6: r0 = epoll_create1(0x7ffff) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x4}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x6d) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000001c0)={0x3, 0x9, 0x6e0, 0x3, 0x81}) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 347.525783] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:00 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x1000000000000, 0x0, 0x9917, 0x10002}, 0x4) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x25a, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:01 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x25a, 0xe7, &(0x7f0000e0b000)) 12:09:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x5455010000000000}, 0x1c) 12:09:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000080)={'erspan0\x00', 0x6}) 12:09:01 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2, 0x9}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) r11 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$RTC_WKALM_SET(r11, 0x4028700f, &(0x7f00000001c0)={0x0, 0x0, {0x38, 0x19, 0x3, 0x4, 0x0, 0x800, 0x3, 0x120}}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 347.821359] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:01 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x7fff, &(0x7f0000000080)=0x1) 12:09:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) 12:09:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x2304}, 0x1c) 12:09:01 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) pipe2$9p(&(0x7f00000001c0), 0x80800) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 348.082850] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:01 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x0) 12:09:01 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) r5 = semget(0x3, 0x7, 0x140) semctl$IPC_INFO(r5, 0x5, 0x3, &(0x7f0000000840)=""/247) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) semget(0x0, 0x7, 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) ioctl$KVM_RUN(r10, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r9, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) 12:09:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x12c, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000040)=""/158, 0x9e) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000140)={0x80, 0xbc2}) 12:09:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xe00}, 0x1c) 12:09:01 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x101) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 348.377891] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:01 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xc40, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = gettid() r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r3, &(0x7f00000000c0), 0xffffffff) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000040)=@int=0xfffffffffffffffd, 0x4) sched_setattr(r1, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r2, r3, &(0x7f0000000000), 0x1000000008) 12:09:01 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x21, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x50040) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000100)={0x6, [0x200, 0x3, 0x7, 0x2, 0xba7f, 0x1]}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0xffffffffffff8001, 0x8}) r2 = creat(&(0x7f0000001200)='./file1\x00', 0x23) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000000200)=""/4096, &(0x7f00000000c0)=0x1000) 12:09:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x8030100000000000}, 0x1c) 12:09:01 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0xcb7, 0x2, 0x4, 0xffffdffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r3 = accept$alg(r2, 0x0, 0x0) r4 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r4, 0x0, 0x10004, 0x7d) sendfile(r3, r4, &(0x7f0000000000), 0x400) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r5, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r7 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r7}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r8, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r5, 0x127d, &(0x7f0000000040)=0x5) r9 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r8, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) ioctl$KVM_SET_DEVICE_ATTR(r6, 0x4018aee1, &(0x7f0000000480)={0x0, 0x1, 0x101, &(0x7f00000001c0)=0xe410784}) fcntl$getown(r9, 0x9) mq_open(&(0x7f00005a1ffb)='#\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x404, 0x0, 0x2}) r10 = semget(0x0, 0x7, 0x2) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r11, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r12}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r10, 0x0, 0x0) 12:09:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x600}, 0x1c) [ 348.679991] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 348.733106] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:02 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/protocols\x00') r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") semop(0x0, &(0x7f0000000180), 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:02 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed0000008004000000000000000000000000000000000000000000008da9"}) 12:09:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xff00000000000000}, 0x1c) [ 348.939082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x4002000000000000}, 0x1c) 12:09:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000200)=[{0x4, 0x0, [0x2, 0x10001, 0x0, 0x0, 0x0, 0x7ff, 0x81, 0x6, 0x9, 0x1000, 0x8, 0x1, 0x2, 0x101, 0x2, 0x80000000]}, {0x8, 0x0, [0x8, 0xffffffffffffffff, 0x1, 0x3, 0x80000000, 0x96bf, 0x95, 0x101, 0x9, 0x8, 0xffffffffffffffeb, 0x1, 0x6, 0x5, 0xdfc, 0x1f]}, {0x2, 0x0, [0x81, 0x2, 0xff, 0x3f, 0xfffffffffffff800, 0x100000001, 0xd3, 0x1ff, 0x20, 0x8, 0x7fff, 0x1, 0x1f, 0x40000000000000, 0x0, 0xffffffffffffffff]}, {0x0, 0x0, [0x3, 0xfffffffffffff000, 0xffffffff, 0x92af, 0x6, 0x101, 0x1e8, 0x3, 0x81, 0x6, 0x6a5, 0x3, 0x2400000000000, 0x7, 0x7ebd91c2, 0x5]}, {0x11, 0x0, [0xffffffffffffff95, 0x11b507d3, 0x8ba3, 0x1, 0xe97f, 0x100000000000000, 0x3, 0x55fdc179, 0xfffffffffffff000, 0x3ff, 0x6, 0x2, 0x2, 0x8d5, 0x8, 0x5]}, {0x10, 0x0, [0xfffffffffffffff9, 0x8, 0xfffffffffffffffb, 0x5, 0x1, 0x7b7d77f6, 0x80, 0x0, 0x1, 0x81, 0x9, 0x2, 0x80, 0x8, 0x6, 0xa85]}, {0x2a, 0x0, [0x8, 0x261b, 0xa000000, 0xf9, 0x80, 0x0, 0x1, 0x5, 0x3ff, 0x6, 0x20, 0x1200000, 0x5, 0x5, 0x80000000, 0x3a]}, {0x20, 0x0, [0x0, 0x200, 0x3ff, 0xfffffffffffffffb, 0x80000000, 0x1000, 0x7fffffff, 0x8, 0x6, 0x7, 0x8, 0xe75, 0x8, 0x4, 0x401, 0x7]}, {0x4, 0x0, [0x3e, 0x7, 0xcc, 0x1ff, 0x4, 0x8, 0x5, 0x3, 0xeb2, 0x1, 0x9, 0x100000001, 0x8, 0x29, 0x1]}, {0x6, 0x0, [0xaefecc0, 0x355, 0x5, 0xfffffffffffffffd, 0x4, 0x800, 0x100000000, 0xffff, 0x7, 0x7, 0x9, 0xb2d, 0xffffffff, 0xa5, 0x2, 0x8]}], r2, 0x1, 0x1, 0x2d0}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) [ 349.025763] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:02 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x228, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:02 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f0000000840)={0x3ff, 0xa9, 0xa6d, 0x0, [], [], [], 0x2, 0x3f, 0x1, 0x8, "ecb5f0a6f632582443490baff93ce119"}) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:02 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) dup3(r1, r1, 0x80000) 12:09:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x54000000}, 0x1c) [ 349.231273] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(0xffffffffffffffff, r0, &(0x7f00000000c0), 0xffffffff) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x1000000008) 12:09:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1c5, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:02 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000002740)='/dev/zero\x00', 0x100, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000002780)=@req={0x3, 0xfffffffffffffffd, 0x200, 0x61}, 0x10) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x20000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) 12:09:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xe000000}, 0x1c) 12:09:02 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 12:09:02 executing program 1: r0 = gettid() r1 = eventfd(0x10000000006) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000040)) sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0xffff, 0x9917, 0xffff}, 0x0) openat$cgroup(r2, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) [ 349.526973] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x2000000}, 0x1c) 12:09:03 executing program 4: r0 = eventfd(0x412000fd) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xbc1, 0x101000) sendfile(r0, r2, &(0x7f0000000000), 0x1000000008) 12:09:03 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) fdatasync(r0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x125001, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x81, 0x28080) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) 12:09:03 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f00000001c0)={0x0, 0x14, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ioctl$TIOCSBRK(r9, 0x5427) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:03 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:03 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200400, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x82, 0x6aa9]}, 0x8) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) [ 349.792615] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:03 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x198, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xdb030000}, 0x1c) 12:09:03 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000dc0)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x14) sendmmsg(r4, &(0x7f0000000640)=[{{&(0x7f0000000740)=@xdp={0x2c, 0x6, r5, 0x2}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000600)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000000600)={&(0x7f00000007c0)={0x1d, r10}, 0xffffffcc, &(0x7f0000001a40)={&(0x7f0000000e40)=ANY=[]}, 0x1, 0x0, 0x0, 0x8844}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) r11 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bd7000fcdbdf25"], 0x10}}, 0x0) sendmmsg(r11, &(0x7f0000000180), 0x400000000000117, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) 12:09:03 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/net\x00') r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x20, 0x200802) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000100)={'bcsh0\x00', {0x2, 0x4e20, @broadcast}}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) 12:09:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x423}, 0x1c) [ 350.075979] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.096945] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x181, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xb00000000000000}, 0x1c) 12:09:03 executing program 3 (fault-call:2 fault-nth:0): r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:03 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f00000001c0)) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f0000000480), 0x11c935f0, &(0x7f00000006c0)={0x0, 0x989680}, &(0x7f0000000640)={0x5}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:03 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) 12:09:03 executing program 1: r0 = gettid() r1 = eventfd(0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000040)) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) [ 350.426202] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.426825] FAULT_INJECTION: forcing a failure. [ 350.426825] name failslab, interval 1, probability 0, space 0, times 0 [ 350.447875] CPU: 1 PID: 22908 Comm: syz-executor3 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 350.456463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.465829] Call Trace: [ 350.468439] dump_stack+0x1c9/0x2b4 [ 350.472088] ? dump_stack_print_info.cold.2+0x52/0x52 [ 350.477303] ? perf_trace_lock+0xde/0x920 [ 350.481472] should_fail.cold.4+0xa/0x11 [ 350.485560] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 350.490686] ? lock_release+0xa30/0xa30 [ 350.494677] ? dput.part.26+0x248/0x7a0 [ 350.498675] ? perf_trace_lock+0xde/0x920 [ 350.502862] ? zap_class+0x740/0x740 [ 350.502879] ? trace_hardirqs_on+0x10/0x10 [ 350.502894] ? perf_trace_lock+0xde/0x920 [ 350.502908] ? zap_class+0x740/0x740 [ 350.502929] ? lock_acquire+0x1e4/0x540 [ 350.502945] ? fs_reclaim_acquire+0x20/0x20 [ 350.502961] ? lock_downgrade+0x8f0/0x8f0 [ 350.502980] ? lock_acquire+0x1e4/0x540 [ 350.502995] ? check_same_owner+0x340/0x340 [ 350.503010] ? rcu_note_context_switch+0x730/0x730 [ 350.503027] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 350.503062] __should_failslab+0x124/0x180 [ 350.503078] should_failslab+0x9/0x14 [ 350.503094] kmem_cache_alloc_trace+0x2cb/0x780 [ 350.503109] ? _parse_integer+0x190/0x190 [ 350.503132] alloc_pipe_info+0x16b/0x590 [ 350.503148] ? pipe_read+0x940/0x940 [ 350.503166] ? ksys_dup3+0x690/0x690 [ 350.503180] ? perf_trace_lock+0xde/0x920 [ 350.503198] ? perf_trace_lock+0xde/0x920 [ 350.503213] ? zap_class+0x740/0x740 [ 350.503230] splice_direct_to_actor+0x6fc/0x8f0 [ 350.503247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 12:09:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000200)={0x200, 0x200, 0x9, 0x3, 0x0}, &(0x7f00000012c0)=0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r1, 0x5}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001300)=@assoc_value={r1, 0x40}, &(0x7f0000001340)=0x8) r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendto$llc(r3, &(0x7f0000001380)="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", 0x1000, 0x1, &(0x7f00000001c0)={0x1a, 0x32e, 0x5, 0x0, 0x3, 0x4, @local}, 0x10) sendfile(r2, r3, &(0x7f00000000c0), 0xffffffff) r4 = getpgrp(0xffffffffffffffff) sendmsg$nl_netfilter(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0x1034, 0x6, 0xb, 0x801, 0x70bd2a, 0x25dfdbfb, {0xf, 0x0, 0x6}, [@nested={0x14, 0x91, [@typed={0x8, 0x29, @pid=r4}, @typed={0x8, 0x8f, @u32=0x9}]}, @nested={0x100c, 0x27, [@generic="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", @typed={0x8, 0x52, @ipv4=@rand_addr=0x1d7}]}]}, 0x1034}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendfile(r2, r3, &(0x7f0000000000), 0x1000000008) 12:09:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x54}, 0x1c) 12:09:03 executing program 2: r0 = shmget(0x3, 0x2000, 0x54000000, &(0x7f0000ffe000/0x2000)=nil) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x0) shmat(r0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) [ 350.503261] ? pipe_to_sendpage+0x400/0x400 [ 350.503278] ? do_splice_to+0x190/0x190 [ 350.503291] ? security_file_permission+0x1c2/0x230 [ 350.503308] ? rw_verify_area+0x118/0x360 [ 350.503324] do_splice_direct+0x2d4/0x420 [ 350.503341] ? splice_direct_to_actor+0x8f0/0x8f0 [ 350.503361] ? rw_verify_area+0x118/0x360 [ 350.503378] do_sendfile+0x62a/0xe20 12:09:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xc4ffffff00000000}, 0x1c) [ 350.503400] ? do_compat_pwritev64+0x1c0/0x1c0 [ 350.503423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 12:09:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000000c0)="203bf391aa7db15efc012e1802c0e51b55a34b3fbf649b7232d93a19a717ac5e80f676fde415330755a3ee17978eed7665461a68080c668afe0a2d1da19ef3f7056d5ca6633f49c7b245ad0cc1dc6b45fd1af9742e87a483635ff05836ff2e087e24315cc73dd99977885265d5b2c5893f3abc88e1a56303b658d55976a10cab8ab1fee58200f7cc", 0x88, r1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) [ 350.503438] ? _copy_from_user+0xdf/0x150 [ 350.503456] __x64_sys_sendfile64+0x15d/0x250 [ 350.503473] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 350.503487] ? ksys_ioctl+0x81/0xd0 [ 350.503508] do_syscall_64+0x1b9/0x820 [ 350.503537] ? finish_task_switch+0x1d3/0x870 [ 350.503563] ? syscall_return_slowpath+0x5e0/0x5e0 [ 350.503579] ? syscall_return_slowpath+0x31d/0x5e0 [ 350.503595] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 350.503611] ? prepare_exit_to_usermode+0x291/0x3b0 [ 350.503627] ? perf_trace_sys_enter+0xb10/0xb10 [ 350.503643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.503665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 350.503677] RIP: 0033:0x456cb9 [ 350.503692] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 350.503700] RSP: 002b:00007fe865b6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 350.503716] RAX: ffffffffffffffda RBX: 00007fe865b706d4 RCX: 0000000000456cb9 [ 350.503724] RDX: 00000000200000c0 RSI: 0000000000000014 RDI: 0000000000000013 [ 350.503733] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 350.503741] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000015 [ 350.503750] R13: 00000000004d33c0 R14: 00000000004c8144 R15: 0000000000000000 [ 350.682482] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 350.774585] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:04 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x87, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:04 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000840)={0x1, 0x6, 0xcf350000000000, 'queue0\x00', 0x7}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x1f}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='\x00', 0x42, 0x0, &(0x7f0000000000)={0x1003, 0x6, 0x4, 0x0, 0x22}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f0000000600)="472bce38be072111a10f3104a38413a2d32efbec3e962c3c413500420100b093260ec98c1643ade0c744bfbfd770df3549a2f925d6e8e40f27280931b9d9ab410f8172e41d567373354a7a6f591100c3", 0x3f, 0xe7, &(0x7f0000e0b000)) 12:09:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xff000000}, 0x1c) 12:09:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x20080, 0x80) membarrier(0x8, 0x0) fstat(r0, &(0x7f0000000080)) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000140)='bpq0\x00') ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000200)={0xdfc, 0x4, 0x4, 0x7, 0x1}) fremovexattr(r1, &(0x7f0000000100)=@known='system.sockprotoname\x00') 12:09:04 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r5) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097dd60b3fb6dbfe4c60de74b3d166c4f5b9a0c1442fd0cd429947ee1ae288fffbfdc4f98e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28116d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c570200000013244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e7d532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 350.987824] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1af, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:04 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040)={0x7fff, 0x8001, 0x80, 0x89, 0x10000, 0x3f, 0x1}, 0xc) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x4401c0, 0x101) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0x800) renameat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') 12:09:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfec00000}, 0x1c) 12:09:04 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x1, 0x400100000000007, 0x8) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x41, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$SETVAL(r8, 0x1, 0x10, &(0x7f00000001c0)=0x3) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:04 executing program 3 (fault-call:2 fault-nth:1): r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:04 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0xffffffff, 0x4, 0x697, 0x5, 0x80000000, 0x6}) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) gettid() [ 351.312309] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.314172] FAULT_INJECTION: forcing a failure. [ 351.314172] name failslab, interval 1, probability 0, space 0, times 0 [ 351.334063] CPU: 1 PID: 22980 Comm: syz-executor3 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 351.334071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.334075] Call Trace: [ 351.334095] dump_stack+0x1c9/0x2b4 [ 351.334113] ? dump_stack_print_info.cold.2+0x52/0x52 [ 351.334131] ? __kernel_text_address+0xd/0x40 [ 351.334151] should_fail.cold.4+0xa/0x11 [ 351.334175] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 351.334192] ? save_stack+0xa9/0xd0 [ 351.334204] ? save_stack+0x43/0xd0 [ 351.334215] ? kasan_kmalloc+0xc4/0xe0 [ 351.334231] ? kmem_cache_alloc_trace+0x152/0x780 [ 351.334245] ? alloc_pipe_info+0x16b/0x590 [ 351.334260] ? splice_direct_to_actor+0x6fc/0x8f0 [ 351.334273] ? do_sendfile+0x62a/0xe20 [ 351.334288] ? __x64_sys_sendfile64+0x15d/0x250 [ 351.334303] ? do_syscall_64+0x1b9/0x820 [ 351.334320] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.334336] ? trace_hardirqs_on+0x10/0x10 [ 351.334353] ? mntput_no_expire+0x18e/0xbc0 [ 351.334366] ? do_raw_spin_lock+0xc1/0x200 [ 351.334385] ? lock_acquire+0x1e4/0x540 [ 351.334400] ? fs_reclaim_acquire+0x20/0x20 [ 351.334414] ? lock_downgrade+0x8f0/0x8f0 [ 351.334428] ? lock_downgrade+0x8f0/0x8f0 [ 351.334444] ? lock_release+0xa30/0xa30 [ 351.334459] ? check_same_owner+0x340/0x340 [ 351.334471] ? check_same_owner+0x340/0x340 [ 351.334488] ? rcu_note_context_switch+0x730/0x730 [ 351.334504] __should_failslab+0x124/0x180 [ 351.334518] should_failslab+0x9/0x14 12:09:04 executing program 4: r0 = eventfd(0x0) open(&(0x7f0000000180)='./file0\x00', 0x10000, 0x11) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000080)='net/igmp\x00') sendfile(r0, r2, &(0x7f0000000040), 0xffffffff) sendfile(r0, r2, &(0x7f0000000000), 0x1000000008) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) 12:09:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x300}, 0x1c) 12:09:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x5555}, 0x1c) [ 351.334532] __kmalloc+0x2c8/0x760 [ 351.334556] ? kmem_cache_alloc_trace+0x318/0x780 [ 351.334572] ? _parse_integer+0x190/0x190 [ 351.334588] ? alloc_pipe_info+0x29e/0x590 [ 351.334605] alloc_pipe_info+0x29e/0x590 [ 351.334621] ? pipe_read+0x940/0x940 [ 351.334637] ? ksys_dup3+0x690/0x690 [ 351.334654] ? lock_release+0xa30/0xa30 [ 351.334670] ? pid_task+0x115/0x200 [ 351.334686] splice_direct_to_actor+0x6fc/0x8f0 12:09:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x23040000}, 0x1c) [ 351.334703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.334717] ? pipe_to_sendpage+0x400/0x400 [ 351.334734] ? do_splice_to+0x190/0x190 [ 351.334748] ? security_file_permission+0x1c2/0x230 [ 351.334764] ? rw_verify_area+0x118/0x360 12:09:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x3000000}, 0x1c) [ 351.334780] do_splice_direct+0x2d4/0x420 [ 351.334796] ? splice_direct_to_actor+0x8f0/0x8f0 [ 351.334813] ? rw_verify_area+0x118/0x360 [ 351.334829] do_sendfile+0x62a/0xe20 [ 351.334848] ? do_compat_pwritev64+0x1c0/0x1c0 [ 351.334865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 351.334877] ? _copy_from_user+0xdf/0x150 [ 351.334891] __x64_sys_sendfile64+0x15d/0x250 [ 351.334904] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 351.334916] ? ksys_ioctl+0x81/0xd0 [ 351.334932] do_syscall_64+0x1b9/0x820 [ 351.334943] ? finish_task_switch+0x1d3/0x870 12:09:05 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x176, 0x0, &(0x7f00000050c0)={0x77359400}) [ 351.334959] ? syscall_return_slowpath+0x5e0/0x5e0 12:09:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x40000000}, 0x1c) [ 351.334975] ? syscall_return_slowpath+0x31d/0x5e0 [ 351.334991] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 351.335007] ? prepare_exit_to_usermode+0x291/0x3b0 [ 351.335023] ? perf_trace_sys_enter+0xb10/0xb10 12:09:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x14280000000000}, 0x1c) [ 351.335053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.335073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.335083] RIP: 0033:0x456cb9 [ 351.335099] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.335106] RSP: 002b:00007fe865b6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 12:09:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x500}, 0x1c) [ 351.335120] RAX: ffffffffffffffda RBX: 00007fe865b706d4 RCX: 0000000000456cb9 [ 351.335129] RDX: 00000000200000c0 RSI: 0000000000000014 RDI: 0000000000000013 [ 351.335137] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 12:09:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x7}, 0x1c) [ 351.335145] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000015 [ 351.335153] R13: 00000000004d33c0 R14: 00000000004c8144 R15: 0000000000000001 [ 351.560527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.647509] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.715542] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.786636] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x36, 0x0, &(0x7f00000050c0)={0x77359400}) [ 351.876724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 351.946373] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 352.036238] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 352.098116] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x7f, 0x4000) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000240)) r2 = socket(0x7, 0x820ff06180d90377, 0xf5) setsockopt$inet_group_source_req(r2, 0x0, 0x2f, &(0x7f0000000040)={0x4, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e23, @remote}}}, 0x108) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x2, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd908e0", 0x0, 0x1ff}) socket(0x1a, 0xa, 0x8) 12:09:05 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000018c0)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000019c0)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000001a00)={r3, 0x1, 0x6, @remote}, 0x10) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x40) sched_setattr(r0, &(0x7f0000000040)={0x0, 0x6, 0x1, 0x5, 0x40, 0x9917, 0xffff, 0xfffffffffffffffd}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xb}, 0x1c) 12:09:05 executing program 3 (fault-call:2 fault-nth:2): r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:05 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000840)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) openat$cgroup_ro(r9, &(0x7f00000001c0)='cgroup.controllers\x00', 0x0, 0x0) [ 352.266096] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 352.283003] FAULT_INJECTION: forcing a failure. [ 352.283003] name failslab, interval 1, probability 0, space 0, times 0 [ 352.294307] CPU: 1 PID: 23056 Comm: syz-executor3 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 352.302800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.312148] Call Trace: [ 352.314750] dump_stack+0x1c9/0x2b4 [ 352.318389] ? dump_stack_print_info.cold.2+0x52/0x52 [ 352.323593] ? lock_release+0xa30/0xa30 [ 352.327588] should_fail.cold.4+0xa/0x11 [ 352.331666] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 352.336786] ? kasan_check_read+0x11/0x20 [ 352.340948] ? kasan_check_write+0x14/0x20 [ 352.345196] ? do_raw_spin_lock+0xc1/0x200 [ 352.349444] ? trace_hardirqs_on+0xd/0x10 [ 352.353599] ? __wake_up_common_lock+0x1d0/0x330 [ 352.358371] ? lock_acquire+0x1e4/0x540 [ 352.362351] ? fs_reclaim_acquire+0x20/0x20 [ 352.366680] ? lock_downgrade+0x8f0/0x8f0 [ 352.370837] ? trace_hardirqs_on+0x10/0x10 [ 352.375091] ? check_same_owner+0x340/0x340 [ 352.379420] ? rcu_note_context_switch+0x730/0x730 [ 352.384363] __should_failslab+0x124/0x180 [ 352.388606] should_failslab+0x9/0x14 [ 352.392424] kmem_cache_alloc_node_trace+0x26f/0x770 [ 352.397545] __kmalloc_node+0x33/0x70 [ 352.401362] kvmalloc_node+0x65/0xf0 [ 352.405092] iov_iter_get_pages_alloc+0x7da/0x1530 [ 352.410043] ? lock_release+0xa30/0xa30 [ 352.414052] ? iov_iter_fault_in_readable+0x460/0x460 [ 352.419252] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 352.423935] ? is_bpf_text_address+0xd7/0x170 [ 352.428442] ? kernel_text_address+0x79/0xf0 [ 352.432862] ? __kernel_text_address+0xd/0x40 [ 352.437365] ? unwind_get_return_address+0x61/0xa0 [ 352.442305] ? __save_stack_trace+0x8d/0xf0 [ 352.446645] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 352.451666] ? iov_iter_pipe+0xc2/0x2f0 [ 352.455654] default_file_splice_read+0x1da/0xb10 [ 352.460502] ? splice_direct_to_actor+0x6fc/0x8f0 [ 352.465350] ? do_splice_direct+0x2d4/0x420 [ 352.469676] ? do_sendfile+0x62a/0xe20 [ 352.473571] ? __x64_sys_sendfile64+0x15d/0x250 [ 352.478251] ? trace_hardirqs_on+0x10/0x10 [ 352.482493] ? mntput_no_expire+0x18e/0xbc0 [ 352.486819] ? iter_file_splice_write+0x1010/0x1010 [ 352.491840] ? memcg_kmem_get_cache+0x1fc/0x9d0 [ 352.496517] ? mem_cgroup_handle_over_high+0x130/0x130 [ 352.501800] ? fs_reclaim_acquire+0x20/0x20 [ 352.506129] ? lock_downgrade+0x8f0/0x8f0 [ 352.510279] ? lock_downgrade+0x8f0/0x8f0 [ 352.514428] ? __lockdep_init_map+0x105/0x590 [ 352.518939] ? __mutex_init+0x1f7/0x290 [ 352.522921] ? __ia32_sys_membarrier+0x150/0x150 [ 352.527686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.533228] ? fsnotify+0xbac/0x14e0 [ 352.536952] ? _parse_integer+0x190/0x190 [ 352.541106] ? fsnotify_first_mark+0x350/0x350 [ 352.545699] ? alloc_pipe_info+0x29e/0x590 [ 352.549938] ? fsnotify+0x14e0/0x14e0 [ 352.553752] ? security_file_permission+0x1c2/0x230 [ 352.558777] ? iter_file_splice_write+0x1010/0x1010 [ 352.563796] do_splice_to+0x12e/0x190 [ 352.567603] splice_direct_to_actor+0x270/0x8f0 [ 352.572277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.577822] ? pipe_to_sendpage+0x400/0x400 [ 352.582155] ? do_splice_to+0x190/0x190 [ 352.586136] ? security_file_permission+0x1c2/0x230 [ 352.591161] ? rw_verify_area+0x118/0x360 [ 352.595322] do_splice_direct+0x2d4/0x420 [ 352.599478] ? splice_direct_to_actor+0x8f0/0x8f0 [ 352.604334] ? rw_verify_area+0x118/0x360 [ 352.608498] do_sendfile+0x62a/0xe20 [ 352.612225] ? do_compat_pwritev64+0x1c0/0x1c0 [ 352.616823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.622367] ? _copy_from_user+0xdf/0x150 [ 352.626533] __x64_sys_sendfile64+0x15d/0x250 [ 352.631053] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 352.635642] ? ksys_ioctl+0x81/0xd0 [ 352.639283] do_syscall_64+0x1b9/0x820 [ 352.643181] ? syscall_return_slowpath+0x5e0/0x5e0 [ 352.648140] ? syscall_return_slowpath+0x31d/0x5e0 [ 352.653094] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 352.658122] ? prepare_exit_to_usermode+0x291/0x3b0 [ 352.663146] ? perf_trace_sys_enter+0xb10/0xb10 [ 352.667826] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.672686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.677880] RIP: 0033:0x456cb9 [ 352.681082] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.699991] RSP: 002b:00007fe865b6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 352.707721] RAX: ffffffffffffffda RBX: 00007fe865b706d4 RCX: 0000000000456cb9 [ 352.715010] RDX: 00000000200000c0 RSI: 0000000000000014 RDI: 0000000000000013 [ 352.722300] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 352.729584] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000015 [ 352.736863] R13: 00000000004d33c0 R14: 00000000004c8144 R15: 0000000000000002 12:09:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfc00000000000000}, 0x1c) 12:09:06 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x6ef, 0x1) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@int=0xfffffffffffffffb, 0x4) getdents(r1, &(0x7f0000000140)=""/137, 0x89) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8, 0x80000) setsockopt$inet6_int(r2, 0x29, 0xd7, &(0x7f0000000100)=0xffff, 0x4) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:06 executing program 6: r0 = epoll_create1(0x80006) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x428000, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000600)=0x6) r2 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r3, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r5 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r5}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000040)=0x5147) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) r8 = fcntl$getown(r7, 0x9) r9 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r10 = semget(0x0, 0x7, 0x2) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r11, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r12}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r10, 0x0, 0x0) mq_notify(r9, &(0x7f00000001c0)={0x0, 0x2f, 0x200000000000001, @tid=r8}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r4, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r9, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r9, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xda, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x20, 0x0) write$sndseq(r1, &(0x7f0000000200)=[{0xb8d, 0x0, 0x7fffffff, 0x8001, @time, {0x1, 0x6f8}, {0x800, 0x5}, @quote={{0xffff, 0x200}, 0x0, &(0x7f0000000100)={0x0, 0x9, 0xae, 0x4, @tick=0x9, {0x18000000000000, 0x6}, {0xbea, 0x1000}, @raw32={[0x4, 0x100000001, 0x7fff]}}}}, {0x8, 0xff, 0x3, 0x2c, @time={0x77359400}, {0x36f, 0x1}, {0x1, 0x2}, @result={0x3ff, 0x80}}, {0x9, 0x8, 0x30000000000, 0x1, @tick=0x80, {0x0, 0x7}, {0x4, 0x100000001}, @connect={{0x80000001, 0x7}, {0x38000000000000, 0x200}}}], 0x90) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x7ff, 0x4) write$P9_RWALK(r1, &(0x7f00000000c0)={0x30, 0x6f, 0x1, {0x3, [{0x40, 0x3}, {0x20, 0x3, 0x4}, {0x1, 0x2, 0x8}]}}, 0x30) write$P9_RLERRORu(r1, &(0x7f0000000140)={0x17, 0x7, 0x2, {{0xa, '/dev/vcs#\x00'}, 0xfffffffffffffff9}}, 0x17) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(r1, &(0x7f00000002c0)={0x4d, 0x7, 0x2, {{0x40, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008"}, 0x8c39}}, 0x4d) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) [ 352.889625] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x22000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0xc4900, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000200), &(0x7f0000000240)) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x801000, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',blksize=0x0000000000000a00,max_read=0x0000000000000009,blksize=0x0000000000001200,allow_other,max_read=0x0000000000001000,default_permissions,\x00']) 12:09:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x2}, 0x1c) 12:09:06 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000001c0)={0x2}, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000640)=0x7, 0xffffffffffffffa7) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:06 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 353.020837] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x121, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x20000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000100)=""/222) 12:09:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x2000000000000000}, 0x1c) 12:09:06 executing program 1: r0 = gettid() socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000100)={0x5, {{0x2, 0x4e22, @remote}}, {{0x2, 0x4e24, @local}}}, 0x108) r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r3, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r2, r3, &(0x7f0000000000), 0x1000000008) 12:09:06 executing program 3 (fault-call:2 fault-nth:3): r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:06 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfec0}, 0x1c) [ 353.161627] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 353.226242] FAULT_INJECTION: forcing a failure. [ 353.226242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 353.238213] CPU: 0 PID: 23130 Comm: syz-executor3 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 353.246715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.256084] Call Trace: [ 353.258683] dump_stack+0x1c9/0x2b4 [ 353.262331] ? dump_stack_print_info.cold.2+0x52/0x52 [ 353.267554] should_fail.cold.4+0xa/0x11 12:09:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xa}, 0x1c) 12:09:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x2, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) [ 353.267577] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 353.267593] ? is_bpf_text_address+0xae/0x170 [ 353.267612] ? lock_downgrade+0x8f0/0x8f0 [ 353.267629] ? lock_release+0xa30/0xa30 [ 353.267645] ? kasan_check_read+0x11/0x20 [ 353.267658] ? rcu_is_watching+0x8c/0x150 [ 353.267672] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 353.267692] ? lock_acquire+0x1e4/0x540 [ 353.267711] ? fs_reclaim_acquire+0x20/0x20 [ 353.267729] ? lock_downgrade+0x8f0/0x8f0 [ 353.267750] ? check_same_owner+0x340/0x340 [ 353.267772] ? rcu_note_context_switch+0x730/0x730 [ 353.275314] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 353.276944] __alloc_pages_nodemask+0x36e/0xdb0 [ 353.276964] ? default_file_splice_read+0x1da/0xb10 [ 353.276982] ? do_splice_to+0x12e/0x190 [ 353.348104] ? splice_direct_to_actor+0x270/0x8f0 [ 353.348124] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 353.348144] ? fs_reclaim_acquire+0x20/0x20 [ 353.362317] ? lock_downgrade+0x8f0/0x8f0 [ 353.366478] ? trace_hardirqs_on+0x10/0x10 [ 353.369172] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 353.370725] ? lock_release+0xa30/0xa30 [ 353.370747] ? kasan_unpoison_shadow+0x35/0x50 [ 353.370761] ? kasan_kmalloc+0xc4/0xe0 [ 353.370780] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 353.370799] alloc_pages_current+0x10c/0x210 [ 353.403504] push_pipe+0x400/0x7a0 [ 353.407081] ? __kmalloc_node+0x47/0x70 [ 353.411092] iov_iter_get_pages_alloc+0x866/0x1530 [ 353.416060] ? lock_release+0xa30/0xa30 [ 353.420072] ? iov_iter_fault_in_readable+0x460/0x460 [ 353.425286] ? is_bpf_text_address+0xd7/0x170 [ 353.429798] ? kernel_text_address+0x79/0xf0 [ 353.434219] ? __kernel_text_address+0xd/0x40 [ 353.438733] ? unwind_get_return_address+0x61/0xa0 [ 353.443669] ? __save_stack_trace+0x8d/0xf0 [ 353.448002] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 353.453064] ? iov_iter_pipe+0xc2/0x2f0 [ 353.457076] default_file_splice_read+0x1da/0xb10 [ 353.461934] ? splice_direct_to_actor+0x6fc/0x8f0 [ 353.466792] ? do_splice_direct+0x2d4/0x420 [ 353.471120] ? do_sendfile+0x62a/0xe20 [ 353.475011] ? __x64_sys_sendfile64+0x15d/0x250 [ 353.479707] ? iter_file_splice_write+0x1010/0x1010 [ 353.484734] ? memcg_kmem_get_cache+0x1fc/0x9d0 [ 353.489413] ? mem_cgroup_handle_over_high+0x130/0x130 [ 353.494696] ? fs_reclaim_acquire+0x20/0x20 [ 353.499027] ? lock_downgrade+0x8f0/0x8f0 [ 353.503201] ? lock_downgrade+0x8f0/0x8f0 [ 353.507357] ? __lockdep_init_map+0x105/0x590 [ 353.511867] ? __mutex_init+0x1f7/0x290 [ 353.515846] ? __ia32_sys_membarrier+0x150/0x150 [ 353.520610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.526150] ? fsnotify+0xbac/0x14e0 [ 353.529882] ? _parse_integer+0x190/0x190 [ 353.534057] ? fsnotify_first_mark+0x350/0x350 [ 353.538644] ? alloc_pipe_info+0x29e/0x590 [ 353.542884] ? fsnotify+0x14e0/0x14e0 [ 353.546700] ? security_file_permission+0x1c2/0x230 [ 353.551726] ? iter_file_splice_write+0x1010/0x1010 [ 353.556748] do_splice_to+0x12e/0x190 [ 353.560583] splice_direct_to_actor+0x270/0x8f0 [ 353.565264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 353.570805] ? pipe_to_sendpage+0x400/0x400 [ 353.575135] ? do_splice_to+0x190/0x190 [ 353.579117] ? security_file_permission+0x1c2/0x230 [ 353.584140] ? rw_verify_area+0x118/0x360 [ 353.588304] do_splice_direct+0x2d4/0x420 [ 353.592462] ? splice_direct_to_actor+0x8f0/0x8f0 [ 353.597320] ? rw_verify_area+0x118/0x360 [ 353.601475] do_sendfile+0x62a/0xe20 [ 353.605207] ? do_compat_pwritev64+0x1c0/0x1c0 [ 353.609804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 353.615347] ? _copy_from_user+0xdf/0x150 [ 353.619508] __x64_sys_sendfile64+0x15d/0x250 [ 353.624011] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 353.628610] ? ksys_ioctl+0x81/0xd0 [ 353.632247] do_syscall_64+0x1b9/0x820 [ 353.636148] ? finish_task_switch+0x1d3/0x870 [ 353.640658] ? syscall_return_slowpath+0x5e0/0x5e0 [ 353.645592] ? syscall_return_slowpath+0x31d/0x5e0 [ 353.650527] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 353.655549] ? prepare_exit_to_usermode+0x291/0x3b0 [ 353.660575] ? perf_trace_sys_enter+0xb10/0xb10 [ 353.665253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.670110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.675302] RIP: 0033:0x456cb9 [ 353.678499] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.697401] RSP: 002b:00007fe865b6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 353.705120] RAX: ffffffffffffffda RBX: 00007fe865b706d4 RCX: 0000000000456cb9 [ 353.712412] RDX: 00000000200000c0 RSI: 0000000000000014 RDI: 0000000000000013 [ 353.719682] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 353.726953] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000015 [ 353.734226] R13: 00000000004d33c0 R14: 00000000004c8144 R15: 0000000000000003 12:09:07 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$TIOCCONS(r1, 0x541d) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:07 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1e, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:07 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r2, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_notify(r6, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r6, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r2, &(0x7f00000e6000), 0x0, 0x7, &(0x7f00000001c0)={0x77359400}) 12:09:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x800000000000000}, 0x1c) 12:09:07 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x4d, 0x101, 0x9}) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4400) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x80045300, &(0x7f000004d000)={0x0, 0x0, "636c69656e743100fffc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008", 0x0, "010f010000000100", "88e7ed00000080000000001ef6c699f539e07ca19ab52389861ec9db7fd918e0"}) 12:09:07 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000480)={0x6, [0x20, 0x8b13, 0x7, 0x0, 0x1, 0x1]}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) r6 = fcntl$getown(r2, 0x9) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x8, 0x100000001, 0x20, 0x0, 0x9, 0x9d9}) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @tid=r6}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:07 executing program 2 (fault-call:6 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 353.883292] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 353.981134] FAULT_INJECTION: forcing a failure. [ 353.981134] name failslab, interval 1, probability 0, space 0, times 0 [ 353.992512] CPU: 0 PID: 23181 Comm: syz-executor2 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 354.001014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.010408] Call Trace: [ 354.010433] dump_stack+0x1c9/0x2b4 [ 354.010457] ? dump_stack_print_info.cold.2+0x52/0x52 [ 354.021868] ? lock_acquire+0x1e4/0x540 [ 354.025857] should_fail.cold.4+0xa/0x11 12:09:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x3e, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xa00000000000000}, 0x1c) 12:09:07 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e20, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 354.029932] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 354.035069] ? do_raw_spin_unlock+0xa7/0x2f0 [ 354.039499] ? lock_acquire+0x1e4/0x540 [ 354.043485] ? debug_object_assert_init+0x368/0x4b0 [ 354.048511] ? lock_downgrade+0x8f0/0x8f0 [ 354.052674] ? kasan_check_read+0x11/0x20 [ 354.056831] ? do_raw_spin_unlock+0xa7/0x2f0 [ 354.061248] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 354.065847] ? lock_acquire+0x1e4/0x540 [ 354.069839] ? fs_reclaim_acquire+0x20/0x20 [ 354.074183] ? lock_downgrade+0x8f0/0x8f0 [ 354.078353] ? lock_acquire+0x1e4/0x540 [ 354.082350] ? check_same_owner+0x340/0x340 [ 354.086690] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 354.091376] ? rcu_note_context_switch+0x730/0x730 [ 354.096326] __should_failslab+0x124/0x180 [ 354.100570] should_failslab+0x9/0x14 [ 354.104389] kmem_cache_alloc_trace+0x2cb/0x780 [ 354.109081] ? trace_hardirqs_on+0xd/0x10 [ 354.113245] ? __local_bh_enable_ip+0x161/0x230 [ 354.117930] ? _raw_spin_unlock_bh+0x30/0x40 [ 354.122355] igmp_group_dropped+0x59a/0xe10 [ 354.126691] ? igmp_timer_expire+0x660/0x660 [ 354.131116] ? check_lifetime+0xa20/0xa20 [ 354.135289] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 354.140856] ? rtnl_is_locked+0xb5/0xf0 [ 354.140870] ? rtnl_trylock+0x20/0x20 [ 354.140886] ? ip_mc_leave_src+0x224/0x370 [ 354.140906] ip_mc_dec_group+0x1df/0x500 [ 354.140924] ip_mc_leave_group+0x2bd/0x4b0 [ 354.140939] ? lock_acquire+0x1e4/0x540 [ 354.140956] ip_mc_source+0x101e/0x12d0 [ 354.140977] ? lock_release+0xa30/0xa30 [ 354.156019] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 354.157046] ? ip_mc_join_group_ssm+0x30/0x30 [ 354.157078] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 354.157095] ? _copy_from_user+0xdf/0x150 [ 354.157121] do_ip_setsockopt.isra.13+0x32bb/0x3e70 [ 354.202754] ? ip_ra_control+0x640/0x640 [ 354.202775] ? __fdget_pos+0x1bb/0x200 [ 354.210735] ? lock_release+0xa30/0xa30 [ 354.214719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 354.220273] ? _parse_integer+0x13b/0x190 [ 354.224436] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 354.229990] ? lock_acquire+0x1e4/0x540 [ 354.233975] ? __fget+0x4ac/0x740 [ 354.237445] ? lock_downgrade+0x8f0/0x8f0 [ 354.241604] ? lock_release+0xa30/0xa30 [ 354.245591] ? lock_acquire+0x1e4/0x540 [ 354.249579] ? get_pid_task+0xd8/0x1a0 [ 354.253483] ? __fget+0x4d5/0x740 [ 354.256959] ? ksys_dup3+0x690/0x690 [ 354.260686] ? __f_unlock_pos+0x19/0x20 [ 354.264678] ? lock_downgrade+0x8f0/0x8f0 [ 354.268845] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 354.274410] ? wait_for_completion+0x8d0/0x8d0 12:09:07 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) dup3(r2, r2, 0x80000) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:07 executing program 3 (fault-call:2 fault-nth:4): r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:07 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x6e6bbf, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xd4) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x5051010000000000}, 0x1c) [ 354.279006] ? lock_release+0xa30/0xa30 [ 354.283020] ip_setsockopt+0x4c/0x140 [ 354.286853] tcp_setsockopt+0x93/0xe0 [ 354.290668] sock_common_setsockopt+0x9a/0xe0 [ 354.295176] __sys_setsockopt+0x1c5/0x3b0 [ 354.299338] ? kernel_accept+0x310/0x310 [ 354.303406] ? ksys_write+0x1ae/0x260 [ 354.307224] ? syscall_slow_exit_work+0x500/0x500 [ 354.312096] __x64_sys_setsockopt+0xbe/0x150 [ 354.316520] do_syscall_64+0x1b9/0x820 [ 354.320416] ? syscall_slow_exit_work+0x500/0x500 [ 354.325269] ? syscall_return_slowpath+0x5e0/0x5e0 [ 354.330215] ? syscall_return_slowpath+0x31d/0x5e0 [ 354.335171] ? prepare_exit_to_usermode+0x291/0x3b0 [ 354.340199] ? perf_trace_sys_enter+0xb10/0xb10 [ 354.342890] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 354.344886] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.344909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 354.344921] RIP: 0033:0x456cb9 [ 354.344941] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 354.375311] FAULT_INJECTION: forcing a failure. [ 354.375311] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 354.387351] RSP: 002b:00007fc85ac60c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 354.387366] RAX: ffffffffffffffda RBX: 00007fc85ac616d4 RCX: 0000000000456cb9 [ 354.387375] RDX: 000000000000002f RSI: 0000000000000000 RDI: 0000000000000014 [ 354.387383] RBP: 00000000009300a0 R08: 0000000000000108 R09: 0000000000000000 [ 354.387391] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000015 [ 354.387400] R13: 00000000004d4428 R14: 00000000004c0000 R15: 0000000000000000 [ 354.443749] CPU: 1 PID: 23213 Comm: syz-executor3 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 354.452263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.452268] Call Trace: [ 354.452290] dump_stack+0x1c9/0x2b4 [ 354.452306] ? dump_stack_print_info.cold.2+0x52/0x52 [ 354.452330] should_fail.cold.4+0xa/0x11 [ 354.477134] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 354.482263] ? is_bpf_text_address+0xae/0x170 [ 354.482281] ? lock_downgrade+0x8f0/0x8f0 [ 354.482298] ? lock_release+0xa30/0xa30 [ 354.482317] ? kasan_check_read+0x11/0x20 [ 354.499072] ? rcu_is_watching+0x8c/0x150 [ 354.503232] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 354.507923] ? lock_acquire+0x1e4/0x540 [ 354.511908] ? fs_reclaim_acquire+0x20/0x20 [ 354.516240] ? lock_downgrade+0x8f0/0x8f0 [ 354.520398] ? check_same_owner+0x340/0x340 [ 354.524731] ? rcu_note_context_switch+0x730/0x730 [ 354.529672] __alloc_pages_nodemask+0x36e/0xdb0 [ 354.534355] ? default_file_splice_read+0x1da/0xb10 [ 354.539382] ? do_splice_to+0x12e/0x190 [ 354.543362] ? splice_direct_to_actor+0x270/0x8f0 [ 354.548215] ? __alloc_pages_slowpath+0x2d60/0x2d60 [ 354.553238] ? fs_reclaim_acquire+0x20/0x20 [ 354.557577] ? lock_downgrade+0x8f0/0x8f0 [ 354.561729] ? trace_hardirqs_on+0x10/0x10 [ 354.565976] ? lock_release+0xa30/0xa30 [ 354.569969] ? kasan_unpoison_shadow+0x35/0x50 [ 354.574561] ? kasan_kmalloc+0xc4/0xe0 [ 354.578465] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 354.584008] alloc_pages_current+0x10c/0x210 [ 354.588435] push_pipe+0x400/0x7a0 [ 354.591985] ? __kmalloc_node+0x47/0x70 [ 354.595968] iov_iter_get_pages_alloc+0x866/0x1530 [ 354.600910] ? lock_release+0xa30/0xa30 [ 354.604894] ? iov_iter_fault_in_readable+0x460/0x460 [ 354.610097] ? is_bpf_text_address+0xd7/0x170 [ 354.614598] ? kernel_text_address+0x79/0xf0 [ 354.619023] ? __kernel_text_address+0xd/0x40 [ 354.623540] ? unwind_get_return_address+0x61/0xa0 [ 354.628489] ? __save_stack_trace+0x8d/0xf0 [ 354.632823] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 354.637850] ? iov_iter_pipe+0xc2/0x2f0 [ 354.641832] default_file_splice_read+0x1da/0xb10 [ 354.646681] ? splice_direct_to_actor+0x6fc/0x8f0 [ 354.651530] ? do_splice_direct+0x2d4/0x420 [ 354.655866] ? do_sendfile+0x62a/0xe20 [ 354.659769] ? __x64_sys_sendfile64+0x15d/0x250 [ 354.664447] ? trace_hardirqs_on+0x10/0x10 [ 354.668698] ? mntput_no_expire+0x18e/0xbc0 [ 354.673028] ? iter_file_splice_write+0x1010/0x1010 [ 354.678081] ? memcg_kmem_get_cache+0x1fc/0x9d0 [ 354.682765] ? mem_cgroup_handle_over_high+0x130/0x130 [ 354.688066] ? fs_reclaim_acquire+0x20/0x20 [ 354.692399] ? lock_downgrade+0x8f0/0x8f0 [ 354.696573] ? lock_downgrade+0x8f0/0x8f0 [ 354.700730] ? __lockdep_init_map+0x105/0x590 [ 354.705239] ? __mutex_init+0x1f7/0x290 [ 354.709227] ? __ia32_sys_membarrier+0x150/0x150 [ 354.713992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 354.719538] ? fsnotify+0xbac/0x14e0 [ 354.723268] ? _parse_integer+0x190/0x190 [ 354.727425] ? fsnotify_first_mark+0x350/0x350 [ 354.732020] ? alloc_pipe_info+0x29e/0x590 [ 354.736271] ? fsnotify+0x14e0/0x14e0 [ 354.740088] ? security_file_permission+0x1c2/0x230 [ 354.745122] ? iter_file_splice_write+0x1010/0x1010 [ 354.750152] do_splice_to+0x12e/0x190 [ 354.753964] splice_direct_to_actor+0x270/0x8f0 [ 354.758640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 354.764187] ? pipe_to_sendpage+0x400/0x400 [ 354.768524] ? do_splice_to+0x190/0x190 [ 354.772510] ? security_file_permission+0x1c2/0x230 [ 354.777536] ? rw_verify_area+0x118/0x360 [ 354.781700] do_splice_direct+0x2d4/0x420 [ 354.785863] ? splice_direct_to_actor+0x8f0/0x8f0 [ 354.790722] ? rw_verify_area+0x118/0x360 [ 354.794875] do_sendfile+0x62a/0xe20 [ 354.798623] ? do_compat_pwritev64+0x1c0/0x1c0 [ 354.803220] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 354.808765] ? _copy_from_user+0xdf/0x150 [ 354.812923] __x64_sys_sendfile64+0x15d/0x250 [ 354.817428] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 354.822019] ? ksys_ioctl+0x81/0xd0 [ 354.825666] do_syscall_64+0x1b9/0x820 [ 354.829568] ? finish_task_switch+0x1d3/0x870 [ 354.834078] ? syscall_return_slowpath+0x5e0/0x5e0 [ 354.839021] ? syscall_return_slowpath+0x31d/0x5e0 [ 354.843972] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 354.848996] ? prepare_exit_to_usermode+0x291/0x3b0 [ 354.854107] ? perf_trace_sys_enter+0xb10/0xb10 [ 354.858787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.863910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 354.869104] RIP: 0033:0x456cb9 12:09:08 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x84002) sendfile(r1, r1, &(0x7f00000000c0), 0x400) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000100)) 12:09:08 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xc4, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:08 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) setrlimit(0xe, &(0x7f00000001c0)={0xffff, 0x8}) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:08 executing program 2 (fault-call:6 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 354.872303] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 354.891212] RSP: 002b:00007fe865b6fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 354.898928] RAX: ffffffffffffffda RBX: 00007fe865b706d4 RCX: 0000000000456cb9 [ 354.906203] RDX: 00000000200000c0 RSI: 0000000000000014 RDI: 0000000000000013 [ 354.913479] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 354.920751] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000015 [ 354.928023] R13: 00000000004d33c0 R14: 00000000004c8144 R15: 0000000000000004 12:09:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x8dffffff00000000}, 0x1c) 12:09:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xc2, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:08 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f00000008c0)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0xc, 0x5, 0x400, 0x7fff}, 0xfffffed5) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) [ 355.041741] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xffffffff00000000}, 0x1c) 12:09:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0xa4ffffff, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:08 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000001c0)) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0xfd09, &(0x7f0000000600)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 355.167117] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xdb03000000000000}, 0x1c) 12:09:08 executing program 1: r0 = gettid() r1 = eventfd(0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f0000000140)=""/170, 0xaa}, {&(0x7f0000000280)=""/125, 0x7d}, {&(0x7f0000000200)=""/2, 0x2}], 0x4) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x480, 0x0) r3 = add_key$user(&(0x7f00000018c0)='user\x00', &(0x7f0000001900)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000001940)="28183c181dcb2d59ee2ef2c8e3b2616e134a79a53c8d299b6a31c65e7b212c60c5c085e402ecd9bf3d7e9034b84e2794fd86c1521ad10902154f6a488eabfcf9da39f390a2f8a53c9dd6de56a885b63383f208edb4a18c831c66f4863ead19431f666aae9789fe4fbbd3393846a95874386228095f2940873d469d73f6d4132059", 0x81, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r3, 0x7) r4 = geteuid() sendmsg$nl_generic(r2, &(0x7f0000001880)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000001}, 0xc, &(0x7f0000001840)={&(0x7f00000003c0)=ANY=[@ANYBLOB="74140000170011002dbd7000ffdbdf25030000008800f170596887b458cd708d95e4746f5f0d065890c0532a72637d026fe837a9b2cf876b724afad9e58d8de96a40a04a4aae76d294081b78aa1fd350786c56374e2a0da88259e089d720b206974681099da9ad43a6957484262eceb079f43d9a88e7723d3f2831064e2ce42aa04895a51b85c445c79d13d524012902bb3214ecbb066bafb386ecbfe4102300fe4df54f43e98af23bad4c33efae16a5b8a7d3018b23706825a8c50551013a68ea6b736add4bdf7d66038c65ced8bd097d75acd392e84089167861af8d989d5d7ddd46eda2a6b46fc7adcead61c53aaf7b820d451796bd1a737b152161e66717ebf2a414bcd45ca1ea3ad50c274c27656d1ccef07d841b76ff6d4925c105698fa9057dc52b754943b6473b68a93b0bf32a97fcbcf0e0f1f428c594370b6fe8f3650caa923e91e056cef7424b24040f69f0980c0667f77672cb47755b8b3b8ba6ed42e5c0eb2d9aa5935c7f759f8d86826007a730e2811ad86b555bf608a0a4b42d094c392a5b11a639b30ca1ee2071e4f057a51e54881f225aaa0494d775690fc98cdd28d6c7e0a1bf4b9f6423e63203a8e62574e27111e9982cfa56d7da966d14a6884ffb54e5f524aa6296b0c26106ae1d00dd48aaf7c0b3745a58515d9fcb3ecac9ab74bd1fffd050f2818dbeeb2dfa83b943e651b9876ef8dc03e0472e887ad97cf23211320859b9110ed8a75844b329b94cab3bf99a2485f0d1f7a74af1d26f4dd8980d1b148e30177fa3cf08a9e45b8d909f6f520a236fe138441dde645bb1560b9631fbef425e16a7e1fc84b742a08f8cd80121f4e5580c883de182229f10aa813c59bf884d54d0764dfc95f32da29ab33178c27e1903bc8c7bf71e47d68b790aaee4f1030f15082a7e7312efaf06efd9c613c6524684feba17c0b47a006801c5f1a5018b7892f82ea17ff7c3ef5364fddbdc5f2622c9e94812678cc8782c0d544393ea052733b5e2c91419bf9f1bf5b43326f52d8ac9c5e85af58afe19834202064b662ad59f2f60c3011125b7fe16bce7ffd0d65d798f696e3b79e97af0d3fd2d7043f534bb2ccbb2f7ede7304eda0816a27958b11ebe6310120f42af269496988bb8609eb1ebbfaab4b0c7677f42dfc0d996318cefe0a418402c86872a49303654df1ab8f21c42fd7ecd59e668f76da1534b6e6b577f778d49146faae6b54c6135a20c2eba6434d56547f03f6d00270658d0bef59679927cb68b3ff9ab68c6287abc78c6556b66c787eb48dfd2476aeb9fd919c8a34c1399666678fc59982d6aa66a954989d022bf272aa5130d6e68bc6817cdd3eeee846a2d25e505d5144f2a7682f283a13e89d699e9edcf1f5df0d65e6b565b8329bd826dc947c9ec541f0f45cd2fe1976bb308ccda7b56bea1968a266dc0d5da3406d52d10dbb29427ec83c7a09021fcddb34fa13f21d0a064b66f3e5adc222f1103a64965028eb89dd65cfb989e0213b56f267218be60b003dc41904b6bd4f9093c1d4980ef91302bb69de0d966827f716d63036d2709416e3082f0db4d1294f6fd8a2c074732635b297ed45ca5277c66571fe58dc799633361875bd0c7921f8c5cdc20561a5f8d469935216d5eef0d161d6184606f9a873b07367b85e0e8a88eaf83a5ec46fa35ddde9ce68f1b77de4a2d0f1d1ea8188be6712f8c9b4fed55120d04414ac9b5be8eabc27bf06521a4653b80ff2153879f8945c8ecf59cf5402dba81f5e0c078492a0bd4c7617a6b63ada731955d784db8c51b32d69713b3df518274bc47dae35784933c8cb2e653cd09d685cdf0002e169202c9e2eec3590b45ef1adc0fd711db17c008051d836cd1fd52282368c8fb1064b0713241a2b20a28a7bb210b0459cd3e2e6e37eea7ed12b66eb636e011e8e0a9dcede817dc3f9ba1c6e610083e60a8f5771338960d6b72cbf82d0dc4e6e0776a2e283ced2efacbec3fbc6f787ddf36108de7bd9aa16d0773cc52f94dcfb12e5d8e0be799e4b8725b15953dd304ea8b2e51ffd3aff1a27f31e854fb73f656d776248dc88fced747a6d199ca0a518ae7724c318937b6e69504923ae6fc9b36e1f10b3e1bfeef65b2c08465bbf261a6f5416c3dbf92c0b415abade1291eb776470d980d59d1e6e530c19c6be09d830210aa9e615be752c040fb545986d541517403abb2f5d64265bc794bd5716598941b8804c938d7abcdcb06b5b0a00538959449e007d1f172a27c16ca8209bad37b04dd3e2bc7f1e3393d31966890fb3f0a2ffa4e0921cc159470da57fed832bec53881e8febd887c92aedafba2083f1a4106f25a79a1f034e4c86d63962f21795506ea83ec88edf10a3b5c38ab916882bafc80917c79eec6580ae84c33d578bf3d1432cbb5142907143b633763a8d1c90275b8369931360b1a21548e8d7c78da4e75bd03eb272cc22f5fa376992bea97ad6608c86690167e4f1bb671f02af312b89766527bd9a23af69c2d45654d6480112a9a2eb237f46f9e50fb3ac9580768e586652b4126e5b75714bd5dec5835af900752f468171976fd82bcecb97b2a3a7cd27425ff39955f882ea96ee7cbb29352151069c4428201b6a293672f1b03b3e0c729a659558ab68dd552adde35e90b56f0c024190f1f757775c9e37cbc5e051690fceb4f38375f185d53c81a58e478aee015eaa04c9b7d24db081e7eb2e051f559c6fa5f97255d05e21b9686fff71d8abab65bb52e2ba0fc33e31759b696c24ff82befc86b21dbd90e789f8314e7619fe7f11fb3cdf068a3b50149486ce73272f7eccc6e2f3fa27de61a819b51635852b8a4e540d955268e1b9f5fe511a9c9cdbef3ef8601318486c3e8096b3ef9a5411526713a15be5bac52b2c38238524e0c3f7b9a01622997efcf3850363c4f5e405baaf2f4d0f4bdfffde65628f6aac0970253837ea0cdff0b0214f6d2b616601b6edeb340fe28fb1248b20f2ad92c588894814e2856023616615074904ed37afaee5f37002a3b70e74f72bd8d7bb9eb1c018f227f0061dfb573ca236951fdaf79193caee0257a9d1c91a9293a7ff1789337e4df2378f768492a91b9be84eb75e63e3acdcc5009c8da1cad9da040d2732167f9e223a61164dd2dc94ca755f6a1f14a4734109580b54cb3657778b6d2ac9a20cfefdd3c4983167db1a451878729386452666e5f63246bea4ab1b1bccbb95e3c3b916e2dca6061ea544af14e9364c54e4f706974c78a8e6e0f1bdee4fd37b974e0db85631dd3960f8a156b540155c4c47614cc386d44b8435ec5ccae169dd3fd5f961a2093231ca2748082128d57269fcbba14951f1d1ac2730520c5c8cef782c1598ce3381f973f8d175c8e5a3d8223c334861dc6a186129c19cc98b6b801601aa05de5e29385a5ad5e16c32b49f26ef5f83999775f62715f839e938b7a82ed3f3ce7758502cbc50090f5ec12438ea4a0a921a579ae0bdc92c1d4c237cb3c10e593235607979d2dca8bd3894c2964e28b12f2421c89d9a7114508055b0c31ee35966d48f49913a07c7fd05c2e808caf0a703c78ba6d5f1f9b305631d97c82ff5fb1fd93bd69068781d1b0a9da55731597f1bf99cdc6934401ad018710e35cf03d18db8a4fa098070d932fc5469c1eab9394a876ccc0899858d2825287744cb091e5440bdbea2bd3c5f9172f06685677e39f6f7046213fbb025a912cdb5b161a8f51bb4619a5e002cbdf431a6a0ae41df4fb6e4b3ee57149021050afdd667dfebdc496afb4b671bf62d2561bf6f713ac520e7152a2e1916bfcd554c083c24c46f27498079882617768323ab4f4a7e960a07f3a1070974a7ed42a6a22459ad810f3c90024dc90105b51230fa83d32b99c47e5be5ec6efe60fea57078c75692af3040b135422d1fca4ca7b9705b5d4266e9c15bce7e6102abcc9b6ffc1d4c2b7718e2de834e00398f0d85ab441a7bfbbbdcd2b02075b9785b4242111831dfbbc6df7ba98d1fdabf45d90a803f728022da3254dae5c409b54fd7f864a0172e0bcee9b70d0f1fae23d3b3caa5a097bbfd89e16ff44a83046d5758476b6e2e864a4920851cd39d0a80b9306f4a82590a1a9668bf8c583d0a814f01ea9c34052247ec5f97a5f8b1fd5f4fb5f6e655204a12bf31389fd04f46dfacf842e816cb9caf472426d2f0475bf8405eb7fe7e217aa6217000709b824b345d57c89f70383ec2aaab92d63722f08d7d89631b8c55fc8be9b4479e6c7c563a2ad751dbbc5603e93d33ca5cba0f24b94936e011b33d667d720eb3ea48ab385435b27690e238037c165aa848b41eab2d62a4dbea311056367581bafd362e2ece02ab1ad1dec0de3d0a151f0820a9ef9c44f40f8ab5ead81de487feafcb45ad75306a399ae5e045af0623a9396a2f5533cd07d50e27882fe8fc75fd7e88a5f5902d96b93db3386febf38501493021137cd5746342090385c793c83c8ea9b0064ed0d41077bb909ec92e67e6782152369b022834d6f09dc70d0125aa2f02b4ba96d4dcde1c0ecc65151bcd95895d8ee1f41bfc89c5e87d50f41d812b1dd7626b57a86607dabc33d2ec5f169bc4d225d04b610b4bfa3620d68091ea62879a257a151dae8e7e1962bddc67b60db299b7d36220580cb39b2bd74eae5e2aef76e8183b79168c3c19ff523aeca9484463d0d15fcac8d621d02ca699862e5e494fcd93530ab55b8e0e8acde735a211bd4aff3f247314dc0565a1fc68017870f4f48f98409afa7478420c7d775e354933e1f86567b1d813a9f63332ac98d78f67a7cb3201005877d12b73b3a701ef4480cc98ef749db3420d582f342bb8c63521bef9a97ebf27958b83d8cf4c971f71b99e847f5c17eb645fea4bb3690b8342dc3c2b177672fa8cd4fe1ea995f6b832a94eb0e89e4a9f828eb3bac9ff068bb1e00c51fc495c5367f7e47eb7aa24a29dfeaae1e3249807a09a33b64e79450e92e3f1eca71f4d4ba7800f5878c2e039805b398774c9cb1484e39e63756d1da055ddf1d097705a7330138f37cb2e72c5311b36d2d0589a31050a5d94a573baed19d3d6af052ea79358565a1eef414518f4957c304b00dc7dd0e7d40b06a79b8d308e2991396a0bd4f0986b699b29abdbc52af41948e1877b0c37b5b889ff86121f81ef2a4c9b2a386905d1f9bf59073110337652e8a4b5dc42a8e181aa2938bcec8aaeeb66f22fb89510de266c3e30c7ce55db9e85fe62bea24b765bf6a3d495bf4d0f3bf9afb651764a303feab98ca4bcacfb916ed48e4808a46d2e07a60be436cb5f3441062503dd35b71396bd7407d4f2011fdec1bdbfa5710b7a365b62512147beb120b3f8b88f6c2ad28f6ce13b76c4463877a9378222981dd66589f88a58830ff41e49a6a93083aff378912aa329a35ce3d4a37ce4392880d03be8af9dd3087d922a88ce921bb13e3070f48a46a1fc09a6fa6639f39d9e8720af812ba7909ebae64568bf6aebfa4a81e77e6da93fda45fd0369b208889bc432b83987c6bb3c130c54b1f813a7263707e36698ce568352b07a0764005a493288833577658a600119a5f36a015a5133bf68efcb4a6a2789ee1fea070bcdfac2ca9e6db6b1ccc2e563ef20e8e736f457e3d344d91dc9a13564a3bb77c9fb6c8d62dc73811c0c54683d926f2cf619241810c509855064f3644eb8eec977012564fb3f5f83b93983ebaa8e8df9434b2949cab6dd7ad41abfcc2e0d489f6d0879a7de3b9ae02407b2ef5dbeeaa3c46710a6c76c5c422b339743e88268d92927e44e79f27f2cec832605493d2106d4dc2da7488a509b3d9c8dea50c6c2907f2c5f778ca9c6032d3aa3e8b0c647b1d1739ce70ff38fcabbf2da162fb0107d345e8a5dcffef51eb37721baed7d6ddcf21c07c39f612b0eb8e1e20ee364eef2fd1e04badc8b9e53b2a23d2267ef21aabc66a46821d9d85e7bfaf6a05c2a82713af93e6c4a67046d0bd893b8b3481bbf07a429645df44a497bdcb0dc2e5576abf52eecacd1d35956f89fa8cb73e0dfdd564ccbd3b4a15f82b750e2584b7faf0aa5c239fdc661db13eecb30e8a76e87ef5bd1397027521f05227198f14cab9eb175407e8b633a1129fbc5cdc39a15a738a98297c83facd103445e223d32ac68c44ebe6d783078f692db84feb76cb66eeef7e5276686f1de9435d41aeae0ac45d797dda3fcb1bc854b4f1b14cf7b1fdb5721f6f99b0179e170dc505a0dc9d46991635c89ec1a234ef2ce346956c9bdc7fe8dc65129a84856d4159f90ea42161aace7ff8800c8e1c15f84397c33810ebe5c452bd115d505bebbd42cde1915384aedd507b3057fff0aa5ece5b0000d2533c043c8c4ad9ce62e90cc1cfa243793786c1c878c10f4b7ffcd20e05d8a531b55f480487c27bd7bf269458963de4e3a0255e97233493f01509c6d444c59a5d0e2ca1ea20548308964f20ea547e465695aa9fa4ee021e415047901a281e8739fe6a5488547992cdb568eaf71459d957234ab760618d44c014940d6bd5f235bd080d503c7e2c8a57c5ad18473b82e7ddbd3ea3744bb2fb085ca4ec452143e3bc59fa25ebb1ed0dc7c41795c63a42c738983256d81e9bf192cd0ce8b4b0dc230f51058dfa8cc174dca82eb50ad428ff192067870458bc0125003b1e56250134e557fbbb05afc0ca2bd5e25d8fef1d4430fa9976caa649ffa98c531edd8877db162c920d5ad06320e4be782f3bf48e77824ce910c0e29f9ec404f6707cd478644f2e6c6d3321fd34a9857d632802eac3ed9eaae6a4867242034e292243fb1d0bf3435a1acc6efb58752d43d3d21130f1120c442184a1a544f989ecda8ae34886c0e94e132ce784e8707604cc888a1ec4038d596d89e7d65266d62d8716759baca33deb89a333f08cec26676431f018e44a3b96b16026d1b16b65d37a513b76c0d3ec5a84bd7b5aecfdcfd4ad010ea1e48f1f6680737200db9d3bc2315cd202c612ee0b88dba3af533ceb647e9450dd09607da1819f8eed099fb9fe6dc7fe4cfa430483da1340505eb9f995f01cfc3a0bec6c51a672c7e04802cc28a034e248075f7c6b83e74642a388e77b49190f06597654ef3dfefc64a655954d8f12fdef8d420ace87c1006efde007806527b005f6590e208f4ad020395f3a1ed85cedb38618c5c6b22c799d73531cfc9ea22976190ed12ac869480f5f5c0abf74f551e35444e9be300faea302a558d23fe6212131c0291a26d64dd10f4c999cc3b3eec51f25ba3506fc8b1f3aa92f9cb947b15ee700004400630008007c0000000000000000000000", @ANYRES32=r0, @ANYBLOB="30005e0036568834b24488517887cbd933c0867a91bd60a1d87d96d47ec3febe98abbda479699108eb168a22a700000008000700", @ANYRES32=r1, @ANYBLOB="14003e002f6465762f7573626d6f6e230000000008009000", @ANYRES32=r4, @ANYBLOB='\x00\x00'], 0x1474}, 0x1, 0x0, 0x0, 0x20004000}, 0x40004) r5 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x100) connect$bt_l2cap(r5, &(0x7f0000000080)={0x1f, 0x4, {0x400, 0x7, 0x3589, 0x9, 0x0, 0x3}, 0x400, 0x2}, 0xe) r6 = syz_open_procfs(r0, &(0x7f0000000240)='N\x008') sendfile(r1, r6, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r6, &(0x7f0000000000), 0x1000000008) 12:09:08 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:08 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x7, 0xfff) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x80000000000002, 0xcf71) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) getdents64(r2, &(0x7f0000000840)=""/160, 0xa0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x2, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 355.276754] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:09 executing program 4: r0 = eventfd(0x0) ioctl(r0, 0xffffffffffffffb7, &(0x7f0000000040)="5dd6ae14857269cc5962703bda72d1f13c4923f003df0f37fc8f075a1b0680637050a1d781218efaea6feef96a56566809141c648574f8214f617de28b0f4da274fa69d312c03f7559f95f78f45423c257e0abe7fe04002147803972") r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000001, 0x13, r1, 0x0) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) r3 = getgid() write$FUSE_ATTR(r1, &(0x7f00000001c0)={0x78, 0x0, 0x8, {0x6, 0x4, 0x0, {0x0, 0x2, 0xcd1, 0x4, 0x2, 0x3, 0x2, 0x7ff, 0x28c, 0xfffffffffffffffa, 0x4, r2, r3, 0x8, 0x6}}}, 0x78) 12:09:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x9000000}, 0x1c) 12:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0xffffffa4, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:09 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vcs\x00', 0x800000000002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:09 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x204, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:09 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x21c, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x200000000000000, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 355.916027] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x1802000000000000}, 0x1c) 12:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x600000000000000, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:09 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() accept$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0xef, r5, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffff8, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x1}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000600)={0x5, 0x3, 0x5, 0x7fff}, 0xc03d463e0fa62cfb) fcntl$getown(r7, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r8, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r8, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 356.074952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:09 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) r7 = fcntl$getown(r6, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @tid=r7}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r8, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r8, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:09 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r3, 0xe00, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x430}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xd1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x50}, 0x1, 0x0, 0x0, 0xc000}, 0x40000) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x1000000, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:09 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) pwritev(r5, &(0x7f00000001c0)=[{&(0x7f0000002040)="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", 0x1000}], 0x1, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x2000000, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfc00}, 0x1c) [ 356.299587] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:10 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x121102, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x4, 0x8006, 0xf386, 0x20, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x5, 0x200, 0x8000, 0x2, r1}, &(0x7f0000000180)=0x10) r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r3, &(0x7f00000000c0), 0x9) sendfile(r2, r3, &(0x7f0000000000), 0x1000000008) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000001c0)=0xdc, 0x4) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000001c0), 0x0) 12:09:10 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x9, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xc0fe}, 0x1c) 12:09:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x6000000, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:10 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000840)={@nfc={0x27, 0x1, 0x1, 0x7}, {&(0x7f00000001c0)=""/40, 0x28}, &(0x7f0000000480), 0x20}, 0xa0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 356.782785] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x156, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:10 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x20a, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x600, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:10 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x3, 0xffffffffffffffff, 0x1001115) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000006c0)=""/33, &(0x7f0000000640)=0x21) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000bc0)}}, 0x10) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_notify(r6, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r6, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x1000000}, 0x1c) 12:09:10 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) mq_unlink(&(0x7f00000001c0)='-#`&.\x00') setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 356.917542] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:10 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') syz_open_procfs(r0, &(0x7f0000000040)='net/stat\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000080)=r0) 12:09:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x6, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x5000000}, 0x1c) 12:09:10 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bbb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f799304700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d889980c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080010000803a5746edfbffffffffffffff13a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa3f000000000000003350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c70000169a4d990ca7b2ac9fa2db635fbc164970417d8a73ad555268046d92301ffc782d48ce5845f44f0a6b279e265be443226bc129c614fa06132eacc906487d5b1403959572fbe9c43fdb85cb79f4e92afe0abdac56"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x100000000000000, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 357.060750] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:10 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000100)={0x80, 0x8, 0x202, 'queue1\x00', 0x7f}) r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') setsockopt$sock_int(r2, 0x1, 0x28, &(0x7f0000000040)=0x1, 0x4) sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x900}, 0x1c) 12:09:10 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x400000000400, 0x1, 0x2}, {0x0, 0x8000000000000}, {0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5}}, 0xffffffc9) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) socket$netlink(0x10, 0x3, 0x8) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x20000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000480)={0x0, 0x2e, 0x2, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0xa4ffffff00000000, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:10 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x4, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) [ 357.629449] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1e6, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x277, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xb00}, 0x1c) 12:09:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x23, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:11 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r6, 0x81009431, &(0x7f0000000dc0)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:11 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(0xffffffffffffffff, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_notify(r6, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) connect$can_bcm(r2, &(0x7f00000001c0)={0x1d, r9}, 0x10) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r6, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 357.813557] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x22, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xff00}, 0x1c) 12:09:11 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r3 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001700)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004a80)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(r1, &(0x7f0000004c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000004cc0), &(0x7f0000004d00)=0x0, &(0x7f0000004d40)) sendmsg$netlink(r2, &(0x7f0000004e00)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x5c20}, 0xc, &(0x7f0000004bc0)=[{&(0x7f0000000100)={0x80, 0x23, 0x1, 0x70bd26, 0x25dfdbfe, "", [@typed={0x68, 0x66, @binary="9c2bb7cfb0a37e9dfbc0983e65725892934be9302f7799d100eeb64e75fa77315d081038adec68d7995d06bc2675642100f839e537085f41da2e3cbccf38649fee907391dfc4e6bd261ec6a789167d95fcc537c0c6ce7ea31a7b4256a59bba4dde8cb7"}, @typed={0x8, 0x7a, @uid=r3}]}, 0x80}, {&(0x7f0000000280)={0x134, 0x11, 0x400, 0x70bd2d, 0x25dfdbfd, "", [@typed={0x48, 0x9, @binary="8a6bef530b1b351275e2e879cbe0a4c5f13a102d2d2bf7dabedb644b27262bc30a2516a5b186280473f1532464517c21bd78b7814559a2cf34ea3003e9c675bb2b81"}, @generic="4f78d0221189e6d227e7b63f2aaa60bcc85a654d5142ad40dbdb0345a2d1e61119256622bc0d2fc6b17b5b55e0ab5155b76956a4186c703c269a03f047d7eb7fb577f9fdfa81b92dc655a43a26fdf8ce6fb09386126f62ed73a51d36d0fc913a95be606eb066b35d23df8431d76fbfdf90a6998c31676c7a1b4f84259d17deeae9a064071e61888782d2bda63d4e08b6d40928103d173bccd65097d5b89eb1646baf57e540a0a70384e0eb034e756c116a39d6653a98b9d3b6594f6085b167de0c93ee70949d6d621ae2c154a8b631191eceb9431e4f79e93c18"]}, 0x134}, {&(0x7f00000003c0)={0x1240, 0x32, 0x709, 0x70bd2c, 0x25dfdbfc, "", [@typed={0x14, 0x8a, @ipv6=@remote}, @nested={0x1060, 0x1b, [@generic="883e8e9fd4875a171867c12a4ee03f315148e565c5270a62b644d6e6fd50fe9d7bf305beb97d2b3024c496e0da71ae4a1bd8977bc68bbdea4af5c79e8e52a580f7f3e86366754b964cbc3156aefbafbb61484828a14eff60", @typed={0x1004, 0x26, @binary="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"}]}, @generic="c80f3492ed6bfc0290ac440b191d2da5a70e04270d575dc8645772c1e6cd3f72f0a056ddc9ab86dcfec478e1791b0da178231d6b66fb60c48f197b64bf8841ff3e698a3f0f171262b8ef14d28610d4060ca485f27544caa428d9d03acb8aca14aab9116741d23d557ec289635d98c27abca1b952560050320b816d2cfa9e7a092196479bddf952c583142c871d1912d7e5556a222ecc912478d49cd7fb020777920c4a7b7c43446f63825fbf9ba372e3ccb7acd307d0675abe9195822037542e23e2e0bcd670102d86c5883bc8a110711676648e4286965f759931222c", @generic="d4d99347b2ba82bc7a6232858a423915fc0a0dfb7a4e1d37b38d512bb695782ca0cb5390090c68f2702c8dcb333a1a8a406e051d37fef10c6d5f5c99d270535a992833a7f351f567d44db29df7acad7893eca3f1c384f3a993a69ffa243464341ab4cdb237df05f82dd0f749699951f473fdeb25f23c0ad07d369b4dbb53a24a0682ca4b8174ae62f898d67a9b2db0fde07db6b7761c7e2e9e6d9c9a85e2ff2a8ca56c1a8773d6703152a79ae5bd0f7952e8a0fc2b3fe9356a57ddbd", @typed={0x8, 0x59, @ipv4=@rand_addr=0x1d}, @typed={0x4, 0x32}, @typed={0xc, 0x68, @u64=0x1}, @generic, @typed={0x8, 0x58, @u32=0x2}]}, 0x1240}, {&(0x7f0000000180)={0x44, 0x31, 0x626, 0x70bd25, 0x25dfdbff, "", [@nested={0x34, 0x92, [@typed={0xc, 0x5d, @str='system\x00'}, @typed={0xc, 0x81, @u64=0xffffffffffffffc1}, @typed={0x8, 0xb, @fd=r1}, @typed={0x8, 0x87, @pid=r0}, @typed={0x8, 0x61, @ipv4=@local}, @generic]}]}, 0x44}, {&(0x7f0000001600)={0xc8, 0x2a, 0x600, 0x70bd2c, 0x25dfdbfd, "", [@generic="6ae8f949580ba9d7a3de3d12b96a59bd47da9fa19d375b8062fdf97cf3164f16b59283774daa11d215e738658aadb7662226bc4de2dc27b0133da1a1257e2a63cd022f721e92e26033d6355df67cd77b7fb1c9b2a32fde61480b6c1b3cad3935f999a6b641700fc6c7d932f1b2e858e41cddb70ddbdf11505226ba27c4c8c2c00f9c21b492e104c75da2f05fd9cf078390e4fca7923e247f2b59b1e6062f399ce6298545d948f1c8de9b02eabf8139f65a39c9b95f"]}, 0xc8}, {&(0x7f0000001800)={0x123c, 0x42, 0x28, 0x70bd29, 0x25dfdbfc, "", [@generic="4c21ad894394bdda8c3eb99aff79061e17f70641d290301c82174b81e6dc2c8ffa694a0f9a59fe8cfd4f73a723b9a3b68809c5c7d782faacf9d95b1425be4393718bb29d29984611606c07516af553328d40281e0456a78d239210734b1ac79e2c1a5c48b11be0653682f621ff731b2f4ace021aec1d0e1fd8c0cce5b76f4d36f4e8de64d5e2382df6cdf672a92faeaa3059e7547ec7390a89d947bf17f9c4335cad8a963a9e49634459", @generic="2b5609f57bdb3c8f3b5c247fa185f1e975162ea37ed00f5892bf9cfb8ac4ed3798ce1a1eb3b4f197c9d3d5bddf9010c8e0c83b02490f7ac8c4cc7d17a9fe9ca4467e612fd19a56248dbf207b4eabd186a53fb631a5c4ee30bfa3a078fe0e89987dd047534f09c1cbc6198d548d81703c799ba23dd8053be9febe1cd4573a311b7c598c5554e14867553f2b98708465755c4f7105ab5bcdd4aa604a37e1b840acfb31", @typed={0x14, 0x4b, @ipv6=@remote}, @typed={0xc, 0x3d, @u64=0x6}, @typed={0x8, 0x39, @uid=r4}, @generic="8be11a7636ceb0b9a5419ec0814213f5f298508b3e4c48d04be18bd94a5278442c21d8effd529b7012dd6e809f7d7204d311fbbfa4645e7938e61d2bef7a31dd81a3a90553f419e734c086df04e68ef0b618d205439e014a714afc14fdfc03e50f82f6148aaa6f970aac1110d753fab67f656f8e1b7a5b5359404122ed7ddeb483e83e0eba6da759d297356d2191211f7d707f819e6d9524638577cf351a7cad20bd8d2a6799c2be75ea2fa1e3d6ece97d9d0e4e956ae435", @generic="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"]}, 0x123c}, {&(0x7f0000002a40)={0x2024, 0x29, 0x310, 0x70bd2d, 0x25dfdbff, "", [@generic="83e99db6629c4d2b6bfd724e0d9c6f5e5442", @generic="b9c452c236521272410e20cc1b78de938ca04cf20391f28e83975f3da47d48e4f9c7badf3c1e7623ade3bdc44765074eb4a93faac0eeb895c73e30a25cc84bef07647c7ed1e74d0b470e664c406e25053101c8ecef3f048e5d2b87718565d88a4866377b0d4ac09ae93d5e8ac3192f510a449c7917fea66bf3958016bbadf75a85f98c85f1cf8ec30a6a22fdcf2d9a9c0308e5261dea3ae1ccfbd48db6f21dd1b19d0610d7636f724e19d2ca51181a5bb6591377caa856943430475dc56d073c36f4480f4c1cc8e35856105a714fca1989737a79b8ae71fb991a4a9dd1a6c550baf6972706501e87def7a7c46321485134d56780fb4d208772c69b64225c58692e573cadeb4582b418eb94f2b2aca72a22f3e49648bc72ddb3421c46841203e7e2f42ad9a8714f5614ad29cbd057e0d0e3ca4aae0223cbf4d09e19154993a50dc0cd20056ec299e224e56cfd324ae586f71c9f72b3a6b88f49ddda3c2208bf2e8fe6cece41c50a946110e7f84f688d20eaf299e4f97914e9350ef3811f32acbb21d86dd11d838ac82df8ef19969c0abbdaadd2b4d2259eb39b73c9bff3c3f5c0090ea49c64d3569b1cfd9bb67e04d630ae4539970f37bb6918b7d2b7e480e6609f1246b9bd609e3bf9199d3d8b1df88533fe5a60f0f4add9dd730432512d4301ca68082679b693919a8404ae1e9f09f595bf119ed2dbd993996453f3669ef97a6f50f47f44661191739b844c61eeb560e2341c72f3018dac8239963d1784d1d624b35cd2f3053e5cf96fc02643f91e2ccb0876626ba6a68188b6d2510d6775d122188b31bd1c5c6613e32103b200f5425aeb381e78bdd036528339afd17f7c9f4b49dfd6c4c519f99d69a9f6b5009c4ccedbd9d25f34538e2cc14e8c75974d87e8a5d1d6036f9dc2ccf2d33be72680616561822dc0d51951065d9a4be2e18b1220572ca49b2030e6c102c00a2e19c827c2d1fb94dc6862b3c6a36e201c568e1f97e6c146e1cfd1a5a6774296d113d2f1a53b8c5eb764cb91d0793058ea82787e7ebf834c2f7eb7b843ff71d35febc9460ab08e2610b4985f8d6f11baa03c70ba939bcfe801414d27ad6b2ea50c81f9afd483c8be279afb46c2baf949ba692bec542b43698ebce5e5029393078ce29d5a499f2c14816500d777440d91cd0949d922622f7cb2892d85782f7b357355b9a9a78998867fdda3cf2caf4743600a69239997992464fa71e921e675eb5c79aa9f9230e0289337a3cc3bbab02e08b8e87f40f8b58144ae8a673c558c1ee3566830513353d4f9ce636d60e6081cce8c34412e8567f1f05ab83e37735acd96c768822fbfc9e04a54af79c39c3fe212ee47580e90a03c59e7fdc3c4ae9bbd89a977791130cbbac0f6b906b399f961c87ecff3c9120da9e1422cf889bf93c6f4f53e522c51745671ce31532c0dbf649755acd255af4df2fa674fb45c282590bf776d1f00cd33df20bdaa66df80231225f3e198c11a3d861ec6d5f4605ff78467b3ee5eeaaf8b345d3c95c25806c5e435d0e468c252c5a6cb14f79b5c7bf22c31d6ffdf98340102578b1dc7e9cc23e1d46ccf28fa9b09dced906f166ab1fca832156b4c58b6098c25f1a7f422b7248d702d4fce53ef03d32dd1949c3cfce0f42727e5b387b65a2028eb30121e0ea79a8658278a48dd6411f05635775081eaba1dc4cf8e2c66a4dfaec0910ac171222c4c1266b3cc0e968ea6634d4de36d92f4e3af3a1533e762ff70ad752985133a1155d6315f1ee307ce2a5eb985f986d5e08849df34554c40cd7ffa943356240b75a880085ea959f50f77a2b4f355ec17ee7d5f7d6ea45043295b5c1b1658cb4941e64e960405c11414aff26251dd2216f526f7e486d44d79f4eaea57a66e90b8e207df316c1d6dfbbab315f4d9c2c9da25d0ff17ee185078d65a6474840a6d369369a191927a681c0243a5b3ca3318712f62ce1ba3acc25a3077e8d731d164fab6115d01c0779c1f97480bd6a987b6bfb16f0e87986e7f0384392da90be14a8dadfd71000716b7320da95670a84299441aef3f02cf13e163e3ee9425612697c54ac586e86825c58a08da20a9b2f1375d7ea5f6b2f9e4ac3629c549308907939b9aadcc2e7a0de869a6adfb15b27f11311e67bd07839271b7009d8dcc196b01a3a36dbc8a0dbabc3d30283838cba6b0f1a13c1003371e72394064271c789095cf2adcc4b88bff448d9d105920e0c5f488d3ea5ec7a735d17cd40b68f915ead683de73f6ebad99e1f75b3716e3e1660156add846315ebe91c46c88e46821e6822d717a7dd16c9d6643733daa19d0ad2ffdf50ad6c1925fad473dc0ee0b924b572a96224367dcbee94879f64ddd3791c9e96269ffbbeb6f02d07cd4dece2eb04c9af48153764aeb3326cf9830c90587d376bf83fc50983c17b98a99c71e5a75657b1886bf68fd6b1dbe50745eab90122240f75f30d3411e2f52b0f98115cc6a15c5cdabf4c505e8e78064fa5ae66d85e788c3c2927fb63168089291de0d33c126abb8778e475060f783a757d2051c9a56bcc0683c4bb6745e9becf1b942fa3dc8dd3db4a3c4cf46b400dfa3b17400e52289b2d916daeb736244fe4b8682a6f30005dea91cbee58a3c9fa633c5edf39cc0b70c27522a41f9d9af7655cc4939057276ff2de0a4dab7b3a13b0f3dd8be0efe70abd1f7ec76bde18f9fd059c1719cf771e443a0dbc75473c2f62f223fe8b4614c518e06ca3b2a37de33634ef44bc749acf1419b6cd9596abc8391c9b791f88b726bf398428f9b640a80340cb4d372bd67df60158fcb00591afd2f4c915172e694dde7a16314bfc54d35394c8f7cf40dd9515561f04add3dc79abccf2a9c8229c635db338d3385ec6bb992a366c7b713948535c29a966d6476b2e802874fcd05419bf77a5e5b31c3db723c7c342cb460a0814750a5717cff67760d9b6c33329a468234679ca87c7ddec628d43a7b9481bd367f0791e8d4dd09f1f9603802b7251e6c9bb19f5157423d3d34ffde59f43f6425c9b25fe5fe3709d7ae8e98efeaf614b30f3117c24cf0f405622bb56853dd284c708983ecbb4a7fa0f8f039866525ca5c430a481198d048ce5e29382abf3840bf477ab4631d21921549472f5b4d1ef7843772f92a6b1dd74568faea9e1326fcece9c505e0f5dfd7472b4ddd620370b271b521a7ef794896daec3adfdda89d7cb7214e7e21fe083f448316832145dd6f4250104c5f4daeba9b798bfedae91d1e4789527d7867acbb04ea5ba8ed9b2ed21882865ad6ad27ee0f79065cfcb5481ec85b6077c978f01450d0e70c464ff45800b11a91c3a0ceb060f72267d749f867f277fa6d8490fce1d9210e42c0631c457fc9febdc351dd6f9bd00794fa2963dd95fae201ff48daea950f3a1c79b0b0ffcc621569d4439924fb91f189d5b8c734c956d4015d774dcf98b7d62c9b8bdd9002634a75f74fff49ca267b962c866a03737801f0d34e38777c934c1cd4ea7645681172bcad3ccc98e8e2938034cdc41d2565db4cb0de0c59e68241b9f89d83d1cee4d53cc2c1857ea7a1ecbe79597455f61291e9fb633c3ec6fc2c23943ef4ef0bbdec8aa959dc3ba39377624b6bf1ceb0ddbde9a6c90a324b64301cf6665b8911e0cbe219dd712df0109e2f1bab020d332e12525b2fc7251d5c0b58cfe24926056abe75368fc6264d9c606401542846ad61a2656f0167696c3022beea000f2d4325042df370fcb6737d87d6fad3f7a17a4163952b27c790589d575661ff6affd50f593e33c2234c26114366d0d95032461d0786e5d4aa103196fd25bc6ffe4a6930f27d7dda5613f86cf252c01c49130f0af5324ad458f1422a5f7d4e51a5d69e25175247158c75ac7b72a611134f9c0f1a7157bae546a447777a836b2be2772d567d9e99a1d212bc1237a90cd5c6d0415868c2f80d40267698da73239e23d098015ba281ccac0a9df03456e2cd7fb33786714fa7caecf185eac2d3af6962760623d7e754c4a14f9b464ecf2f1d634872d7e5acd7f8b4b9583dee01328c5d74c355d501cba3c6a111583ce8006c5f004754e8e0733fcf0ba9641f81aadfc46b96bdae01b21dbb02e2f72ffda8071f57b795a37d959f2c00a0cf26757128a61024019c3a425316d6095efa530caa1e335a358723b624d7731d0e1e8ab5c53151e360afcb26b4840b0753fed56eb4d6f0c1639d770d7abc2f3406afb2b5dc62c8dd0ec7b8832743f4c149bf59a7b22f3bd18027169a22ff2184e697eb56c2131bfe2483459b5409413639014f3b325fabcd0157db16e6716aca923ed235ea66c8348cce5f11f7570b4cf12f06fa8ea1974899f12ef1ba44289eea0c09415913e7c5a9421f8c7463d5d4186bf7a1738687dbe16f88c6611d87d2dcff476db3ee312c4813a86d5d765b5a45fb675aa6e15486553ed16407e28d9e3d7bd027f55b6abe34de913a4f7a729e21c66aec9cae754953a754cbbc50076713132563039031388377bc5a07cc1c113ffe42207436d93e3653f86a0a78333315b7c93555d0239d19aabeb27d4a24107d731fdedd0cdfb286c61ecd8e1ef13c2912e8d57ee21a16c69190e70a312fadbcdda986ad7edd0a41a3f3e04bb79b9218a0205911b2044b2abf5ad9be6f2632c84c68c5a7f4593906ab691946643bd8345ebdbf3a7cc8dcc07fd5b66cf969d7bce5feef7efd76d229bf18336ae99a36ac6f7e589f643fbc5fec39447d2ff0a310901d1c91f522023601fd05d218aa4d4e9cd62283ebb3dd598009299874d99909860c1d3384308a940a0bb6ae83ecf335b91f067d767955e2f7bf9d10127f7dd3945d9ea7a892f13083855c2741005d61f476d44f13b498203bfc186c0ceb4db6e34342c64b03081e2f4fb50ec12559004030ce7ee8f92e14371f9c31ac898b6ffeb8369456187786f91efd8188f3882ffe1dfea248a39c6088783c899101e86b26baf0f5d699b0b9432630140ad1ffd3314ed22dbea2dea77be646f622c1fa8c6caccb77450d3ad24e767eb0328c345152022ef6f8d8bae8d2d11e9e516b8ed609cd72962b3e2c7a378c50729c2e70876f9bdb5247db849ae24340775eabe4f506163088da36c0e376865c449eb4d73afce7df2facf447867c9c510e144fe44e9ed808822fb9b5353497ef9a033e6cd8dcbbf683fcb8bd59f41b030db9d0de223cb3aea714bf134711e97ae138b16989dcd6b7b18e6e3c34500ff9bffc1519c85995e95ad7ef9508a8015e36f4dec84cfd50f631f8784b1cc69dad2b6a1c6a55679ad6afd26f4e6de59c267ebe4ac7074026ad92ff154c5518346d78f427154f9aebbaac1791f644b553358d90f814fc9189be81260e1c27769e2efc301c10fd1551c20806fcd932a0e6f0be2a55d7b256a1029c9be226e59000f3c9d5420aa87031df3ad5aa5e8006a05f3d8f8d95a1bfdf4c54b04104bd0a1f9781a24aea4d30f648592f511c288ec28ef813f0c484165f28e38c26617f3e4f45cb6bd17d23a3c18ed489e5fbf2f096e2b549ec83420c5d12854b0b79340bea03e904dbfb52d6cc3af4f9cee27c722885eda7ef7d4da0945312e7d01eff815566a9d2dbc2faa7f867add491a43d3155e2126a4a63b59e7b19d50eb4481611d29ad2108de84f591b847a62820c55287d4c30185e5123756e184d292851462d83ad39fe3c1d5c64decd5624f045d0db745bae78518809c56e3bcd60afb23240cdc04278deaff840d44f09842f2c4c772badef218a1c512de4cfab02351011513c179c48b6c5d56a8c3559b4126820038d82", @generic="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"]}, 0x2024}, {&(0x7f0000004b80)={0x18, 0x1d, 0x100, 0x70bd28, 0x25dfdbfe, "", [@typed={0x8, 0x0, @uid=r5}]}, 0x18}], 0x8, &(0x7f0000004d80)=[@rights={0x20, 0x1, 0x1, [r2, r2, r2, r1]}, @cred={0x20, 0x1, 0x2, r0, r6, r7}, @rights={0x18, 0x1, 0x1, [r1]}], 0x58, 0x2400c844}, 0x20040010) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:11 executing program 6: r0 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r1, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) socket$inet6(0xa, 0x800, 0xdd4) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_notify(r6, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000340)) preadv(r2, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r6, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 357.995658] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:11 executing program 6: r0 = epoll_create1(0x80006) socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x2}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000001c0), 0x84800) ioctl$TCFLSH(r1, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1b220b8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a1f180997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f920b4e303d7312a50740fe2e37f41dbf42aa141723eb28e9307bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c70000000000"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_notify(r6, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r2, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r6, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:11 executing program 4: r0 = eventfd(0xfffffffffffffffd) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x80, 0x480) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvfrom(r2, &(0x7f0000000340), 0x0, 0x10100, &(0x7f0000000440)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256-generic\x00'}, 0x80) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)) mkdirat(r2, &(0x7f0000000340)='./file0\x00', 0x80) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000380)=0x82, 0xcb) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@int=0x101, 0x4) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180)=0x9a, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') openat(r3, &(0x7f0000000040)='./file0\x00', 0x20000, 0x11a) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, &(0x7f0000000080)=0x5bf, 0x4) r4 = fcntl$getown(r0, 0x9) sched_getparam(r4, &(0x7f00000004c0)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x5, 0x3, 0x4, 'queue1\x00', 0x8}) sendfile(r3, r3, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r3, &(0x7f0000000000), 0x1000000008) 12:09:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x24, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x1f4}, 0x1c) 12:09:11 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x730000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:11 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x800) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 358.527082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:11 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() bind$vsock_dgram(r3, &(0x7f00000001c0)={0x28, 0x0, 0x2710, @host}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x4}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:11 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x147, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x176, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x25, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x15554}, 0x1c) 12:09:12 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x6, 0x3) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 358.712347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2d, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x801000e100000000}, 0x1c) 12:09:12 executing program 1: r0 = gettid() r1 = eventfd(0x400000009e9) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0x2, 0x400, "37679e9dcffea57fe32e2108cfffa7cd0a57556b3acd324f4f70c84dc6f68965b79cf2c4afe9c9bd789511816dad239fbbe936c6c4f3d81501abe9676b4f99f2aca7474726fb683a30ad48e48765a462ec081a8512c51ee88851c17e156763f5d3f448cba97d459f50f6e6af72d1b4ef27c4881a12caa535d0a2a34fcda1e49b76d4da59cb00d1a0c2d2719e48dcfe6e0e303caf4cdc2fdb18d568ca80048c454e2c38dd94296d9efc6f285a8521cf8a6e7b5facdc894cd348f05c655f0a72dc3a80afb41cdc46d93518ddd0b1a244e6cc12ef2b6adf631809825cdd6633b480a94dd36d633c195ced6a9dfd315c542eda6d3ecc16e84329f387d8a497676bef", 0xb, 0xfff, 0x6, 0x10000, 0x5, 0xfffffffffffffffd, 0x3, 0x1}, r3}}, 0x120) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000280)) sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0xc2f) 12:09:12 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f00000001c0)) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0xb, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 358.857928] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:12 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') rename(&(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x6, 0x9, 0x1ff, 0x6791, 0x1, r2}) 12:09:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xa000000}, 0x1c) 12:09:12 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) preadv(r7, &(0x7f00000001c0)=[{&(0x7f0000000840)=""/231, 0xe7}], 0x1, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x8, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:12 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xffffffff00000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0xf, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 359.389648] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x19, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x206, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:12 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x50000}, 0x1c) 12:09:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x21, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 359.603720] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x700}, 0x1c) 12:09:12 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() accept(r3, &(0x7f0000000840)=@can={0x1d, 0x0}, &(0x7f0000000700)=0x80) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000007c0)={@mcast2, r5}, 0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r7, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92858a6f0497024235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6ced170b8b080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848edfa0392568aa8ad51dc468e21b10d3e"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400102, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r8, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r8, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 359.731115] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x28, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xffffff8d}, 0x1c) 12:09:13 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0xffffffffffffffff, 0x80000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x0) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) r7 = fcntl$getown(r6, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) fallocate(r1, 0x0, 0x4, 0x7ff) ioctl$FICLONE(r2, 0x40049409, r8) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) mq_notify(r8, &(0x7f0000000480)={0x0, 0x2e, 0x1, @tid=r7}) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r8, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r8, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 359.833900] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:13 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000040)=0x800) 12:09:13 executing program 1: socketpair(0xc, 0x4, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000004c40)=[{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)="a9f2616a45f2f004fad44e937f139ff5a24c49054d8418276aa763a17f4d254335d00f1fe910b38e5a227b4516b1fb1dcf151be74e0fd7ecd46a12bf2e93e0257b300902ea507a43aea6cd2cdeede778f64a7d2cc0a742e6675604f24787a1f44687a467fd4898313e6e92ca963b6e0c901e4a60c9e0bbb300b6db67f2fb450efbf8bfdaa6b3862cc7b891b856c9d9c773674d5074e065b871505083e10cab3a5a0dad816e5d6e520b8b3a227fdea40d1499b0f0673d6de2f02f7ba307f73cc07e5e966b4c4f", 0xc6}, {&(0x7f00000001c0)="e94e01afba9cb53f725c840435dc2a3a02adc60125aa1caad87b53300e45f54395c34f803d540ae3693e8f1c6c0d2a4406fd0a81a6f5255def8276c4", 0x3c}], 0x2, &(0x7f0000000380)=[@op={0x18}, @iv={0xb0, 0x117, 0x2, 0x9c, "b5b8740cf71f9948d91b5ea3f64476ed04356f8011c7a9b22a0e65fbb398bf06de5798207051bed305ecfa688f3a5816c85440049b280b13b8ef3a05deec6f9d94c795a5247edd704d8d939f9c106a2a0f493ba7d0b8bcf8d790860f5bdedd96deee0de49527f473549a3102323e2b3050870588153632dcc3e734371549a831182aa61c98201fb182e17b0bbf340599e1efed4d70f29b5430050720"}, @op={0x18}], 0xe0, 0x4000090}, {0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000480)="3a6f10b5b77763ba8bf0d6c5c0ad76", 0xf}], 0x1, &(0x7f0000000500)=[@assoc={0x18, 0x117, 0x4, 0x2}, @iv={0x1018, 0x117, 0x2, 0x1000, "290299102447c7ff5dd9570493f8ab65f0d00cb681249002f4740d64ff3c656d6e2322ecab883a7fd3cedbc1d6b176f7ec135ea68de6c2291260217959c31197eb3f48b3958fdfebddd1edeacd78324105c86252463d3d782dbe6c7cc1e4ec88fe2905fad3508a0112d8a11f2906ad1f52628393e8466b27317898e7a17448c8868d5eba5411bf88c81db02123855b7187068fc3cf61528868ed2f8f7eca05ec88f1d6064011fefb2d72fc5d2abc2224ddf3b4110427e3f4547d7755dd2c6e561aa4fd8442b3afbc9e4ad4773c113da5d6259b0a702bc59022d8eb12f2805ae538ca9cb24296166d5d24122a9f39fb20d2a5154c4771194da801db4cf2e66f4aaa3a368fa0682abff66a9e0ca32f7c1f22e9dd3fc3ab738eb7ee91aece6cc01fcd3d208096e6dc025345f7ef70ab76bf7b1ca4914919da460a0ef15ba07bbe8b919c04c6e4fac9b2588e04287096848ff581aa95032cccc939df80a78682b8a49d8acd972e70773f25f4c09127dd8fc4045259133fc9941fc46159de7334ea175ee17eefa0128a71243cfa3fddc6d1384afc52d099793ea2382c9d4cd6dcf96769a69fd89debbff57fac641d94b33986fd509a88304e76faaec532033c825442942fb28817f1224b848ed58d1d316c73f242b0103d31eeb59a8ab9710c04a7e3ca54030b58fdbf652c334316223cbc01b6f1879589d31d26c83c01a9098e46e0b5fa9989a1e1a31b80e72d0b9c79ebf860e06d1352879c61d54012cf24cdd598b842098ec2a5267f4debf42a8fbd5a0d8fbfd874b19cedfc22365d8ff749f6776dca1a7d7959544a56c0c569bf5a06af62575cb13ca33b58e97136ed9695c0ae928e91cedcca2c2aa290e413a031e7a974a9404ebcbf736cb33358c0ce8c4bfde7263f059c7a4868eea0232f90ea2cd62bbd870cd6633b9dd245b55302ef5dbc7793afe76079641c7326166ac5081eff2fcbf8e515da63edb4eb282501803c38af024a6ed9bb4f88d34fe45b09eaa2a7a417c39ace821853c31d76760266faf20050fd0421fcbab7d24bacddf767752ee95a18d26cab8528535cc3c1e0272844f38df7c7a688ce4a98c59a2c662bb324d36a0b9eb184d6f798f73c0b370bd0059d5e65b0c702433aabaab74fe16273acbe544d79ba8735495839fee7aaeaa393d82b711b0bc8094b213560fdc9f26ac91c831761ee92a7fc4c310cb84f2fa5b1ea99e6fd1a666332c2877dda1c13b5e3976fce55795058e318333fb3806050b5e6942ad73498c1c6b1ab23c96b454cc6198cb8881f77c05376e0fcc3aa4f76bd7330836c079f16932bd66e26ea867e533e2128b2142c429dfbf3cd9dec7eadbc89fc6327568c1989e1747d50039045408a08168a376ddb14ea2c2e5890f4020088230764ad58f33c90be5c543dd49e44ef5221977e609ef3e36f9782baf0cfded58932b5bd2ca005d4b779577519ad26948d1528151d837c10cac9d7afbb6d475486f2238fd3cf5b856e85593da47ec3484d6fa3e2b6b7dec5651cc45389453e01c15fa6777aed617c9b4f202366ec5a845fc0fbee28eed28823df698c0fd21fc4b60cb94391ad27e37a3da8313a28059157ad3985b6c73872d457a2a8f2ab6e26a0fe90faa0cfa6cf0c5dce70db6edf74bf09dc732295e4fc0e3b1a1362bcba91340931e273c117133c49bc1eb0fed814cfe1c00f42f7000562c305bcab3410e2d0f0057d4056e42ee0076dced4272166c94a1fe7caf9cdbd3a344bdd4f8e2c67c90eb20480d6c9b50d5bbe43bcca2dbe102fddc7e8f6c58145125e439a9015d89f3a8111e27c1119fad95d8bd9efffaace6f488f211955f0fddd7bd7b1515c28defcefe365a656ccf526d3c15162115f1720c0a5a7279378fce587c037967f13465190a09c6d89297142132cc8b72f981994cc51fda241be3f5d2f484cabdfe77b276783bc738798225045953f34a68ad055bd3d1a88461e208574b40240c564f707743bc8f173e22a2339041b9f6ac2731ab8182fe928dfcdf308b9146e460be6db14a47c6eb61a5d0c040d7d2cd83da996f8c3896f0e491ff498ecc362e871fbcdfc277274ba87833ce018718ecc80b0266a55d5246f176d9388ce1f890eb690a07fb7a890aa79e004a0912a16a8b91f522d29c5d34ca9b2d1050db97a3d5d417c367dde7c229cf06cfce5c1eecf3701514fae53807805e698c5dc389579fc0df5c6d4a9abfbca6e4de00c1df1dc653f68345dbf7a9083fb4db6c7c352eb35667bcd1999e4b751d450225b5e7c86d134ded0f13e8f51f9c1f4fd03fba78db8cbcf52f9f20276f83796d249f5723f6dfda33d840739835161f9ff010286882d7cf3e4900d750eb4a37ac31832c58913d39aea2af3a7b6d8feee77c2495aa02c221a9133059166c42fee176fa56ef2a6cce1c93d934ff6daf9c79814e09df08f4a62da8a71b1538886c825d314c9f4401e3452b2eeabe68fdf25e5d3c4e0b46d7e40200b257cf37c753c04633cfffdcebf6d13a24d8d8db9b4fb17024de4a7ddc25135a0ebdce688f36eefb60c928e0d3f028b7975de81845ff528a71ad2d0a02806ce900538af580d546699045afb42472cdc90ce776835ffba2a2f9a4959a673f16db43388309edfb9907292f110fb644443b6105e66fd643393bdec7454250cb6efb36d50a84cd21f7fd6f3fb515b28135f741247f274d5b36e839a529a1e69ec87a22a5d05787834bb506314e69f4e3d988cb8a0ee0b9a2b3afaafb2d9cf64643a86987dd0281b111a3f7a79f3bac0ef6b8ed5464fa5215f36631a84566ecd336586b01ae7192a3f5cd7488727c0e407a0f413b8cf740efb7c2813da2deb4893701ba4628e10b2192900722ea22887365850f54d5cc1707df518d1820ae4a9d411901003a7ebc5b808942e26225174bb15be10fa25057c8b5ab218f40489db3b29feed2f6604c1400e9a35e65281c6935ca4b4744f1deb9622862312108ce2c6e4852178f049399f4b5545430378f9a11b32877f32e26fe5c74aecd04f52779bc2223332fa5669601855abbcac55775c654334e6568fe498fbb76b6df75e50eee8081f0e1161c1b6bf8b7577b7da879d49461dbbe100c62efc7fa24e494c1b1c5732716ff2c25bbd86997636840eae35557915ea76921c181516e60732be8a13e85d914c3f873bf4a82bd659f153120ab76cbf346b481229405f5ed1b4a4b4c998ad6a216d73eed114afed9ced008632be63c25b3a8dff2adc735b135ac542186a5ee25b118baf87ec9a87c429d6c67312a4e007dda0b25ecce9321eb56cb44e45866f6482accda25e6e7c0c3423be2dee18aad4be462aa614d27aea54d1c1e79f8121a8f1c55aeff95e8520e1d0f9f6683112ae32a44451a19839ed20c6c92e41070f6e0826505e9bd3dc7bde8e5403153800b4b75a4c910732287c5cd55c45ec6a7be33e64e34b32ff1167af3e8b2d7eb67f8844101bece65ad5ce1d2bcbf4517ccf4d59c0ba57a18e70b34aae915ed26790d76c56f5ef7a720dcb5b90c49de8c3cabe3748b19bee091138625ad2e987fba484c0153aa978437e71775a3f99ade2cac5ade47dce7aa474447102e14d56504e582d079e28ccc361c76c5264c1b857e19383559f196956ec4ecd1bb4aea73fa5310033eae5eb071fdd32f6092cf9c3bec72008df0f35157059df9a745443583f3fd891a74acb7249a9f87db62e49937a38e5715f53a786001d13db081a3794ce7d6961425008cbe18f058aa40b867935ba99f85c4ce6cfbf5c3f9481deed5201357485b1aa11b4c8e005b9ca7e02036767b9789b5a2c3d197bfd2368b8eaa1dfca012afa05d2551221f4910470b29f2f70d17daf66412c9dd84716cce727d9fc022fc9a581a18e5fbf05c24a5380059a8b2dd5b70d45262fba21d2ec29e01ca9214d1ce1ac525a760896b348bbf2a709b6e582ccf934edba364bfef889e0cb9dabc57412794d1df3be918c1e397fc7c0401b88c425c142f9e5d51a87ba3bce4257269f6db42f505d1f0d572e9c0b388ce5b93c279311c16010314401c198b9f72a103331206f93e624fd93630c01ae7aacb3c663bbf9b80e36aa7faf75910ceeb4c6e49b3bc7029a5be255f4727919f0e00819e92feb8f8f0a66cbfeb6b06680135b4c56293518ee74c8f3e3c7655cb684e1422810198ec1fd03c3e7b996add826ade41faf2ca6286d4cbf0a07390b49d0905b19f4645776f3f2ed886da2c54e611415cf51ff7b1abe9e10440eef36470528802841557d0a3d4d5ac6608b81ba51e67a67be406da28b8f7d18d9945b00e885306813ac64c2264722e0c771722f4dc6006fb2530abcd86117f34906b018f76c80cbb408bdd03d6d22ebf1a1109e2c9710783f98cf0e55759ab76f7d068c7aa0d73a5cbe4188c079df41b698b0bc4dfaf3e69fd68f32d86b70deafa4637ea50e8e01acc4e3d85727dfe1ba5d4f06a7b352ef2f7f5a7f7a880f4068cc73a0710965fe0592b450677797039bb21e4bf113f3ffd5360a6dc10170f7f8796e2ea11b3b5b8b3ea671ce0f3c482620a49c8f15898cf3836238ba7ab9f2314c11e6bd980d37c6362dc43b4954d9429c0888b332d3ac22bf45e77b7e97f90fe6d880e85a7162b521bed7595220ef3260f06bbb8bda2b39f61e5e0ff718d8c863f3e974c982d494fc5ae9a0aff836037a7326011280363a68be86b6b84c939367a1e200cb7667b1dff1e203ee2efe1a2303b348c011026d42677cd5ffb8756cf63b9ccc024e1ebd65c78a2f2862c4988c2627da9682848db735491f73c29b335ea166a1d0c6ed1a8d90c67dd663fabf7a420f441921074ec9b7a269e4451860811d9021307877b172793f55940fca7c360fcbc610771a2e56f0d35ebfa5340fd43e03052d3a861096971a9e05033190b171993fd54d5bca1f25ca6f62734949d49a504f56794485ac9199e239292f843d3ac5aca23448ffc9d089a6913dc7535c8de891cc1b0297b24e504d467c4ea97667ebdb34b09a98cd1033a04d36e7558e17754dfdb3eb44c8b81b61d3ded16f753b1a9658e832013a25c8355fb900700fc444b75d2c749a92deb278a340b93558b503f7159ac7672df9af8114333cee516a08dcc8e85357eb4ca4ca30c51800eeb18c82466a0d5f2b085319ac403b58f48c0ead0bfe9531f2795b914254890ca58dee2ca23f79412449692795caad007092397bc4e5d5100c99f40f8bcf36ba70204a2832a8b80f8180ceb5ef4c7f4782c3896c9e4bd4d86fdeb04c3d015cccbf908bfef913da5da0c96f860fe3b2d5f33017a8cdd6f91faef87df14e432da699db4204a145a8c4df2b0c21f27a92fbf7deabcf11a13adab41a38003d95d87972a87efc85cbf039a11f0f51bd3e75c818a4090716903cd93e3fde42dd955d07f92ba78bd68aa76fa70072961bc5101d805cf9b3a490af682eff60118a39fc9c789877768a094e33e07959310f9c4fa00ed89d5d68784fe826055202a103659ddfbd2693b7f3224975495c9be3088e7bf3d72556051bfe0ab914a90212e344b6cc1b8d212d4138fdef782f13ddd5e7f0ae878dbaa20af15833074c575693e4d00423dbfa8dc7521777896ff4c7013c2df50ced4c7650661ed60baff718b3e50b6ea99d1fee23d98c0eb9fe240fd834ba6d25325cc5e62e67ee664746e90aa32c18037531c9d525c3d65061613767a4afc42afd727d19f71b3d1f81a131bdf6c90ac2a4bc472bcf90ca8778f8a672a4acb876adac360cdc87d1bcbe1554efce263ab1e3de55715a5cfe09ae41b6"}], 0x1030, 0x4000000}, {0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)="fd041b0f530040e3acbf4a494d5845089be7ec907839b7a5f14e518c5829612944918da1008130c7a0ae5d46c508fab4d20e03101df85aa5a0388958f4b5540a2447a338eb0191aa307ab47704b60e6e7e3f371c392f814a08bc1253537a10d2eb4da2dccadca2f0d353970b3fa6b17fa35469721e51e288618b92", 0x7b}, {&(0x7f00000015c0)="3b0c00a4e3e01e3e641c549fbadf012ade828f34b683af92262a255c37530cd9987d56a91d8354cb05694a407898e5da485c52d59b3e", 0x36}], 0x2, 0x0, 0x0, 0x8800}, {0x0, 0x0, &(0x7f0000002bc0)=[{&(0x7f0000001640)="13bf517e3a169fe5325c", 0xa}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="128cc3a0d550736eb1f28bc2d2425809ec72390e3ecd50bc7a7420c5e75aa61e849d259fe268081c43d5da185879356de1fe056245bdbc540c091851a325015bed2fe583ca8e7e2e6997a4ff19c362188af5192e86a3699b424e616afeda9c9f9c0b4409326db039bd8bd27da19eab93d0e664b1cbbe17d9c1809a0b828b1f04b10cb58457eb1195754dd9c42d3d49ff888bd283a0179a075f54ede4ba3fd72d20b02c8c3988580bbb84151713ab559f", 0xb0}, {&(0x7f0000002740)="65390899ad2846d5718b522805a2e5059c825551a455712bc9a4f9a9596ee848f25aeba1ec3cc4440fe96df4484518bfba8d3987d08e7793223a08d8c11673b49e780e29176523abca7e348a743eaee2313a6beaf352ef223f8fa0bdd7dfd863dca5681a25f605672d369615623a9074f1d7e513a37ee52bbd639ee5aab0ae2ea106c253af5aef4a8d786be1e6474135", 0x90}, {&(0x7f0000002800)="73c4f930c53f1b2ca6a4efed5c53ad53d4a625842cace2b9f9e1783412966d653cbaa8d954c4b5f684064bb258b4c3092e82a4de030fd6ac7b794e4722086eb08b532946eda5bbf5835d1ff7195ba7f9325aed69b85c2758801b4bee1223d1eb1d06a81b3754375586c426ccf48214a60b9092b20f2c8876f8e50eef10a07658c21980bdae0ccedf79b1425fbcc470f58acf7c25aa11f0001db1e768efc65d9fe4ca7b2f9e22f0ce6d231eee37b800f3858150276ecaac75f0f83b6bfd918920464670475c67b78df91976759f208237004b37c0883c93055e91d8b69c4f4faf", 0xe0}, {&(0x7f0000002900)="57a2263c9b21f6178fb074c759058cac8924b7840b485f012fcd2e93bfdc1538e143742911c90cafd7631d5c36064ca06a4e2cf688fa1bd654017a1ff483a34715d776b76fb5fc51eb64a64ca5ab338c77234d75899d512a24d0507d54a572379ee8b4de272f25b1e73045276ab46e47a8365005f65f1a84b90c26ffdf7188b08956015c5b411be334d6e42b52578f86a1ea6998bf35302263", 0x99}, {&(0x7f00000029c0)="388b4713bcc9503de1aa2914a479dfd574524216d9f3423d4918506a99b6f46b7249c8e19c64f17284d61e3d66b170f3c249feb77ed2db838c06ab0e45513e9f63453a7bde8d0bac83e1bf21469771fc62cb92baf46fb61ccef30ab5ffbb5c7b3ba3d788a4a0a8eb52e08caeb7ffc1ff8eaa3a506ed61ce7362509153f5ca8702f55938d5c3b01b8d9be13202117a381cd0bce052c9d04ef3ea8455380ed86464e97a2f03ff359716c8628b7f2b52d6457c55d9dc93d1a3ea4ee05ca5e8c7cd998238bbfd70a5c4f0bd92882fbdbd2fef18416f922918e", 0xd7}, {&(0x7f0000002ac0)="5692100bf828652007de7967776e766b329c0309721560d452b318ae35b502e31655239317466c51918f11385ff6af1f8f433b7cd5bc779b42bac9b89acd60148d25", 0x42}, {&(0x7f0000002b40)="eb9be74425dd964020e0e7f83e9bad8a90d04f136b7b22ce061c4e9adc56398955c394c4ae66045f9a092fbae18c70341246c0b30a50ca0e919c3834f9daa52f35a71273bb8dac3bb11ec3ebad6dbbf85e7820eb312ea705c94bbadb52fe3d961fef", 0x62}], 0x9, &(0x7f0000002c80)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x58, 0x117, 0x2, 0x3e, "d805932d332d94607022da15dd84aacb644fae0c5b8d14340bee52147574fa6ca6cba15ecaf68ca7c88697ed27ff7b950472e4b990a9527cb40648f6f56c"}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18}, @op={0x18}], 0xb8, 0x4000080}, {0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000002d40)="29b1c90965becd994eda6506b7440b6342e86f16859b26537fe3b6a464fe664e73580bec345457f6fa2e86ac6d719812a70ef8be9212fdc5", 0x38}, {&(0x7f0000002d80)="5cad6b39bce06d604c2539cb41b5f167a04fab8743b2d78a9231c352f893243e7670e5de58581f6796b7cf2e85f42cab250779aadbf7396d5f3aefe61b3eeda64a04a2eff012afd4f7e97f4cfa1d0c935ecf7ee25e0e7f1e0f0a1c64b5d2669f7dee67db3b170672eccaea69b313cb0bf73ccf90fa9065ef0613b2d25be50dd7a72201458313d87f", 0x88}, {&(0x7f0000002e40)="f7a5aa9eb9a2e9312eac2470f5a3cd8a77ff9da947842c91c85fb080a01a2671c84aa00e3c8ecfebcd7690209bb951a8e026ef57b7cd12539a7ce4db2378027f2f99c62c0c734ab39c9f6e745a41544ad7718cd3c6ecde544460895ee32f6eb5651c3e1793733c2710ea261d4029857044fab1f5c03849c4505b776370338bd257b69ebc9c26e4abb844623edc48324b16bee13ad883f6d391011a54bed0b3f752ca3171fb9cadeddc187b5b62917cf68b22e29ea2626127eb8fffff8b51b4cc8b80752d774c9cfa2331322b", 0xcc}, {&(0x7f0000002f40)="906e85c106c3d5a760bee30b0802706bbaf74e41414c12867f65e7a576e9a297423cdd56e5d6e1d12845d7abe73319bab29ad761396045a7e1d7dde2d1f447eac5328002f674ac4a3e22662787c9a02a4bdffd338c49e4f8a2ef7c75cd6c78ff93475df979471406d98ac72074ceb7bba9da050eb5f5235642502ba00f110f510c63ef52", 0x84}], 0x4, &(0x7f0000003040)=[@iv={0x38, 0x117, 0x2, 0x1d, "1518eb4e7ad0e7568856c6c4a0493be64afb1001e829dabc157eebb42b"}, @iv={0x108, 0x117, 0x2, 0xee, "d22c82cfe0ade97b01254a43a8ea2c9da09f163f93bd7f34cf06f566d50598e8c5060c7d8bf0a5529809e45830143d89ad179c655d3c2ee63893791eb054b14012ec4266eeb36e7eb04be318ddcc290ece9984a2a60d841047de884691b5d3f90833df12a08bdbaaca39c677f72b76f60b4627bee08c029c7d4946d5668b89f765433ffe9550384e116b624b128106d8a1efb2a221a078f4a181f39f260690ac84c6cdf481c83fd4447e7a1f03070b19bc05c43606e8af356844b305f3e861e70acbb88dd4de65ca7eb1100c44530b42a81ac1b0dabdbdce5bad60f4c3cdcb784395afb3e891811e040999f02d7e"}, @assoc={0x18, 0x117, 0x4, 0x5}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xb3b0}, @iv={0x108, 0x117, 0x2, 0xf1, "b90e7ebc48bca36a9aff925c2815a1fa75fc80381c83f1630cc0fe6468cd2173494f4b84657580d7cd44ef2a0a95b71e1df292ce0da1fb488caae34b55d190b12490d951fd125fa61838dec2abfcd8d91515ed5e2a10e712da985767fd7c45e2b89a7fb14d951eeee9be27c1881b004f7b2149880d617b7db03ffaee477bb8d0033876d37dbe9b6127cc2fda334d00ee74e22ec431efb22e7255448022f7201672a38acfb6f9f9830658ae5906853ef5ab68cafdc80dc6a671a2a683aa8600177a68c7cfb041a12f6b21a1a7d596e7ee157b50195302f4c9947058a6bce6c0396baea2552667a3fbd357b39e06ff0e9d78"}, @iv={0x40, 0x117, 0x2, 0x28, "734906fb6e6a7d6f00153d5304c8654924781909a19796a87ed8660ef7929846dcbd8b5a2643da97"}, @op={0x18}, @iv={0x68, 0x117, 0x2, 0x4d, "abd82c9500b51923eeb6dca92b0567656470b3f050bf23cd46f0ce36005a033d8ede0f89242349bf613709fdce44126305d4ccf30d90943a040ceea5c305b3b58c7469a4a5920e685d5d64524a"}], 0x350, 0x40000}, {0x0, 0x0, &(0x7f0000003580)=[{&(0x7f00000033c0)="210e933b5731a5e04c148d04cf612472beb7ab96788e67662c0c82434a6216e3ad4fcfa57d7bbd4c2acd1782b1c848d396bfb2839c23096889d6ea6bacbdafc89a845eb022e81f7e7c6a6ca274102486ee53a90e1ff0ca7fec8ba171cd0a0faed7f168b9320c0a20a968f5ee1d40ccf62395418912da9a5c0cc7c9173369221ae96b3aa89c3219260316a8917a1aeda950efaba3d3c123060825b5ebd23002b24cf86f6c1547b98b1db91a3a3bb3088d974918f59e87f85fa1d790c9fbe35b8b152682d31d2d88a70a281f", 0xcb}, {&(0x7f00000034c0)="27a0cbf70eee31f0553960da5c7627b2e83a6fb28d736ece1e8031fab7dcc3cfacc277378d0c22f06319aee91bc085ebd21066cdb0659172d02a7fd79c9ac625c5fb3fa2ee53836661c75dff69071fd3dd0220bb4b618fe2cd60f717509d5b954775768ac587ad682877962540e204e1dbd92fe670580aeb9aa04e4b41716a1df953cdb683438571ab0420cdf88cb52a81719f049e93a4fd676b8350f0c317454ac9aa10ffbe989365590b0e1d4b24b24f30", 0xb2}], 0x2, 0x0, 0x0, 0x4000084}, {0x0, 0x0, &(0x7f0000003740)=[{&(0x7f00000035c0)="6a53e6e9631b9eefc4e902a3b7581cae7e728f4328b450c29151277d47231e828d7cba8272a3e1b7191013eadea07a32346a548eb5fd562cba719c5b6db9990c86331e214bff86e97d3672242c964582e535f02671a7c765796ca0f16a76b3de24dc71d660537954240a174cf7e640f24a750aac6a4ed25dd1e6ba5b422372", 0x7f}, {&(0x7f0000003640)="0d31c3fea56782c9897f29add4abdc03ff2b9579eb8f621120c95630fd5e5a6d44aeb1ed8c44de9420f019d65ec65c630060691369831b59c2b275171d592af3989156457dd4797ec06749fef399c6e2d1f0dcc575dc4abf9ab6178c50345bfc5c164ff43056af350b3364cd978fd2330e7a5c2e76f9dfa43b1350b184d826a0fdecfa23c63ed71987a9139d5b915deb171195b1fda0fca0e7d1222134c28850f383b3ca1607f9d0b141f1fd34aebff45a87ca314a954a704b1d1e0b8709702152ab2184d99398b6cc4c36b77a806223b99c41", 0xd3}], 0x2, &(0x7f0000003780)=ANY=[@ANYBLOB="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"], 0x1180}, {0x0, 0x0, &(0x7f0000004ac0)=[{&(0x7f0000004900)="0f0bafc13248d94ec43d2905e4014b18fd60eb1df0ca2d8a56971945fdfa50542edd8d83e3cf7c007484e6c8690cb7dc8ea11cf039a4b627a38cbd259c424619f0ede1b9d6051adf4808fc057547043d2bcd662115dd4b4867f17fa7f9888f0c9325b37f44a74d88965c2c4388373ad6fe920259ff7d6fba3e20b56fe786c00b32b381123d74b4613922e55830b6eaad591e5906dbd21033e48781e8d706dfed542adb69a1d696997db916c7181e2a9dae362ca9d4490239888db75908a2d381efee3e2ea5aecd0f5707b76f867e03", 0xcf}, {&(0x7f0000004a00)="09b448f2fce93b6b5f02400b87a0b03774c1380c446bf830aaae7507cb8f6a8662d07994c7e4baccda3cfd9347f1a2986a89fff38fdf8f98f475b96089fefb6f5694b62e94710f80430638fb1369c09770b117238f15", 0x56}, {&(0x7f0000004a80)="043b8780cf3936b2", 0x8}], 0x3, &(0x7f0000004b00)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x108, 0x117, 0x2, 0xed, "2824ee04f7a0d8de1ea5d8050ace467c875d5a8266267ef294bbb471091410a5becceec24e72284f0e1eb78c1765af07620d27126d0a0f964dfd9db51463eca2c5749989c6cf70cc9b80a503667da4c47aa3dca646a5a86560d323520a2df64bedefeb75eeb66bbf0dc3dff4d2683c6363ad430985ad3175fa266fb156a58b5b68a8390675f45545036b222ee78faa95eb9c98c9ae9bf318f5a7113800fa1fb98bab28a97903de3f99f2768f28c2a4bdb987abb689218b1f3ce9e137bdcd55181474d95a4f4f2744090231c3e83d4c40c3f18618a2bf0952c26602afecc27f8125f0d2031589e99ac78f36c0a0"}, @assoc={0x18}], 0x138, 0x4}], 0x8, 0x4000) r1 = gettid() r2 = eventfd(0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x0, 0x200) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000100)={{0x0, 0x7f3}, {0x1, 0x1}, 0x7, 0x2, 0x80}) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r4, &(0x7f00000000c0), 0xffffffff) sched_setattr(r1, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r2, r4, &(0x7f0000000000), 0x1000000008) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)) 12:09:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x1000000000000000}, 0x1c) 12:09:13 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000840)={0x0, 0xffffffffff53129a, 0xfff, 0xa, 0x6, 0x7fffffff, 0x1, 0x9, {0x0, @in={{0x2, 0x4e21, @local}}, 0x8, 0xfff, 0x2, 0x6, 0x7}}, &(0x7f0000000480)=0xb0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000002040)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000000640)=0x1008) sysinfo(&(0x7f0000000b40)=""/104) r5 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r5}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r7, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000600)={0x1000, 0xfa, 0x40, 0x4000, 0x2, 0x0, 0x0, 0x6}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r8, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r8, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x15, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:13 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xf00000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) [ 360.285836] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x108, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:13 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x19e, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0xa, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:13 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) r11 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x2, 0x60080) ioctl$FS_IOC_GETFSLABEL(r11, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xf401000000000000}, 0x1c) 12:09:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x10, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 360.516260] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:13 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x23a26649f9630026, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x8) setsockopt$inet_udp_int(r2, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0xfffffea3) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r3, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r5 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r5}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000040)=0x5) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r7, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r4, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r8, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) r12 = syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x80000000, 0x103000) mq_timedsend(r12, &(0x7f0000000600), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xc4ffffff}, 0x1c) 12:09:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x11, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x20000000}, 0x1c) [ 360.633261] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.717225] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:14 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:14 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x0, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x4000}, 0x1c) 12:09:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x17, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:14 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0xfffffffffffffffd, 0x40000000006, 0x1, 0x0, 0x0, 0x9917, 0x20000000ffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:14 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x200000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) [ 361.156558] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:14 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xc2, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:14 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x6d, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x30, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x3db}, 0x1c) 12:09:14 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x1000, 0x51, 0x7fa}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) ioctl$KDENABIO(r2, 0x4b36) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x1, 0x4, 0x6) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:14 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x10, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}, {@allow_other='allow_other'}]}}) r3 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff10fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r4, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r5 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r5}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000040)=0x5) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r7, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) [ 361.424956] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x19, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xff0f000000000000}, 0x1c) 12:09:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0xc, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 361.550545] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x4000000}, 0x1c) [ 361.665926] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:15 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000100)={{0xaff5, 0x8}, 'port0\x00', 0x1, 0x400, 0x2, 0x4, 0x2, 0x1, 0x1, 0x0, 0x1, 0x3}) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:15 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x97, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r1, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_notify(r6, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r6, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x6, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0x1c) 12:09:15 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(r0, &(0x7f0000000380)='net/netfilter\x00') sendfile(r1, r2, &(0x7f0000000200), 0xffffffff) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000180)={0x5, 0x8, 0x5, {r3, r4+10000000}, 0x232c00000000000, 0x8}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x420001, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xe}}}}, &(0x7f0000000300)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000340)={r5, 0xf87}, 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:15 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x3, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) [ 362.054537] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:15 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x246, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:15 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x7, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:15 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x140, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r3, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r3, &(0x7f0000000000), 0x1000000008) 12:09:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x12, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:15 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) r12 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r12, r11, r13) 12:09:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xf5ffffff00000000}, 0x1c) 12:09:15 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) sendmsg(r1, &(0x7f0000000480)={&(0x7f0000000600)=@ipx={0x4, 0x2, 0x1, "b0a7f4f2d872", 0x5}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000840)="9a134ce1cbdf4b9f71f95790769edc542d968899c9e553ea628173157722dd79ed19eb91ed2f8fa0a9c6039e612fa0598b05c13caaa4a46f3ed59b637e2a7ca349d6a4fdbec79307b588858e6456b4b5aa8e5d065f2bbb560b34013382d4dadfe3d3e2c29b601ea303abbe6f658604d5a5ce18c04c16c6fb4e30ba3a0fb7212eec7f6baba7e29ce92bf065aa81ed929a6cb912ca45e9c58ec8ed42c196939046d824", 0xa2}, {&(0x7f0000000bc0)="d8c3146f45b9ccb062cc453a9c3da0be82bbac9b56a793d962e6954b04b10df1b6415cad256d99987698852caf3dd79bd51da69582378f3bcfb7fcce9dc82e42ab1d280ac803a22990bc45daa14f927d379dcd47ae5e06d1dfe96b31f816bf1d4ff2e48a76b4052328b2db4522c4e475d44ed0c3a0c719227a333a7fc0105fe105b141908e957dc5c77995f0b47bdd9f6791ac34ec9654653cba483d19b426f527e3ef582b86dc15ddbbd2f1c3581849c5299ab54a213a4a19c5a62e911fb8351d7129742b9add9607054ab9e0991dae9574366c165d0c89d68a0a00e464", 0xde}, {&(0x7f00000006c0)="d89920bad3b720e754ef903e986a0075cef950d494bac5f972216c9f9508c907f35928f8147aa3cc0db6c29fa6f5cc347765eb8ffba9a3ae5f8ccd60116775fdcb99159744107ee7dfca3e2d99662bb17c9efeca29e319577c4aea5b5aae914524704ba56816893181b94b599b7e7a55fc97699e967057a1a8", 0x79}, {&(0x7f0000000cc0)="8ecbfcdf03b13d690b4e69a2cf67901e3f1bd617467ef721285b4616d2f007469858d0693c23a5da775fef9b4a5757ff7485900381400809ad8f674b2a41c5e6be7328721e37bc33a1c3fab39760a8e7bac5d964ceea1abb6260901f0e86a45e6c041039e42810c80cafa1b1b0e8f619d3c419b8821a705c8cf69faf54b9e57e37d3cc2a0ade2414df321afc6db977e49505a6a1101e7c085e906e1b9f12d192da153c67bf3d6100055c1a492a4f26d7172df30f2833aeaf332c15ae", 0xbc}, {&(0x7f0000000d80)="e895a67289b868949508ef3ab91808356362722f2928c214919463c7fe4b8e9e01f82bac0511d394198829bb8e8e9b440fe457156c78d62fe9ff1393aad81fc41100237e205d52191006af576320ba6dedc058cc6cbb62bf5dd9c0b2e24205b5fddc23f028c7ce87daa54695f4df8c6a7634f6d62f6b3f59c93a5dafef2a6a0253269d3db3d2af9f6812d2b13291dce7869f870e05a5a9bb0404e100c9cc9380", 0xa0}, {&(0x7f0000000e40)="e0d085f7b3c1cea4311766b448c062e98031e9860d33f8d469d4c8c42ce42375d9e423fabe335c01eb21746476ce4fd532b3b06c929b8b590175867f382801b4fe4a2c9bc9f30dd534e46c83f95ae4c255322d852ce9d8174a26976462eff6546936e6282c9a5c23dbce0aacb52beaa1763f90374ddccb011f4d4643ef933f6446d795a2005b354c681be7e69f7d2f3f9096ad7bdfcce5ed1ce4818700bdb1af7a60de746b2f57e1138e3677e6d687b0a6194b54d4b705a00258fa127f463b4ed2c0426a86fbd4f41ed031c922cff42a75891bda446c86a5ce", 0xd9}, {&(0x7f0000000f40)="4c5cd755d18ea4677590afa56fa2743820ac244dadc11cb709ce460807a94208d33962a4156a84ee0956e7250f534aa39934249f0bf5b6e7cc75abe3f700782d38a45007fb41509a25a9b20d7033586f131b84e498fa6ae8a43bc63d0991526d9fa53bb40e485b25cea34ecf2d1cfb291ee0e00fbc7ad7aefb85e3af7035c5047b0a9db851c6656c12ad3db1e5c6ecd8474d5909ca1982ee68439df6e9197a7d5f659ba9227443699a1672f0aa3439", 0xaf}, {&(0x7f0000001000)="fd6677d56aed79a5c17c6393dcd63686f870100954cdfe6cb841ccea4a372dabd72795c8dd6d6f07a81adf8b0e283c5c18ce6c2d232fd1b3e969c0f4dabc710347e3a8ad7dfbe8047e188f37bc1d1bbf6723c720d77b9aef6f5ef4b0605db84b916cbbace7fb1d3ea479aeb9024d4c58e5bd24712be17a0a22df4db85e0d63c2402623fde2d63f50c8b4c1e5c2358da84e3100c2fb1e7eb5545050298df557baa31a84fed170bcd97f72ed6b1f2282d9156faa81", 0xb4}, {&(0x7f00000010c0)="3c9743a3d90fbac3e349862cdb3c1c4e00cf8aa752b02de6c7bc9facbaf08cffce62bc5488e1879c794c3c6c863982afeb7945a6111bb98fb0052c71cfe3ae3c7dad9ba09ee10a8edef42eb470dcd624affb36a1ccf120bbb982dcfe1b751f96884299ce519878485a2fe1dd33663c82532b5591581711e19c909bce7bfefec3969ca1053dba5918d4f288036fe26cb4671f8fb46bdf42200060968747ef85129ee85fb464f752a403bb3d976358", 0xae}], 0x9, &(0x7f00000001c0)=[{0x18, 0x113, 0x5, "421b350dc670896e"}], 0x18, 0x22d545481b72478c}, 0x4004000) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 362.312712] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:15 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x4, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xe00000000000000}, 0x1c) 12:09:15 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0xd000) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 362.447066] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:16 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000100)=ANY=[@ANYBLOB="80000000090000001dd19612d03956cc001bad6827fbb7d7a3c4f9ec9cf51a5f820632cdc1e4872ea4b759c27515e810ea1dddaffa612e65ca33a223d247d7aad1ba80f1466d8996450bfb4b19038e4ff529624b0db8f1d1944bfb59"]) 12:09:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfc000000}, 0x1c) 12:09:16 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0xfffffc79, &(0x7f0000000600), 0x0, &(0x7f0000000280)}, 0x2000000}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc016621d6c9e8db80bde4caa8352c3961d8c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a6911cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5d1e82e722a3aaccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a27665203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb30843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb389c10b5857b7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000600)) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:16 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x703000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x18, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 362.937389] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:16 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x2, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:16 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1c9, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x80fe}, 0x1c) 12:09:16 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x16, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:16 executing program 1: r0 = gettid() r1 = eventfd(0x1) write$binfmt_aout(r1, &(0x7f0000000a80)=ANY=[@ANYBLOB="000063000c0300006e010000030000002c030000018000000000000000000000d56d2bece56a4c9473529c51a5d249bb7b0a08bdaf2c0abb48855bb4c9031f1535dff38e0f7b80a6e38ca8651215c57b0a752b8a6a224501d4d50b573b4ee7e20e11442cacbcfcb6f0a155e10bc12bc66fcfe123e0a3dcae6c823bd878e3d8fa58e16ef75b6dc78c4efded203a7155bee312e699b51d3cee0d49ae79c5c1bd37e39f56780000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000020c000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000021000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffffffffffe0000c6045c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000023b50521d5a15794bf876eac8e414fbf4bbefda8c4fbeee116f1522c247b1f2e440e93d02ccba2dfabac18db354f4d388e05ddf8711e440100b14ec1d4df840b0155e291"], 0x7a4) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x33}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x1) sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 363.211856] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x5}, 0x1c) 12:09:16 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000600)=0x8000000000000005) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000480)={0x3005, &(0x7f00000001c0), 0x1, r3, 0x1}) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2, 0x0, 0xffffffffffffffff}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 363.348322] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:17 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000200)=0x1) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) r2 = accept4$unix(r1, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e, 0x800) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) r3 = semget$private(0x0, 0x7, 0x420) fcntl$getownex(r2, 0x10, &(0x7f0000000180)={0x0, 0x0}) syz_open_procfs(r4, &(0x7f00000001c0)='cgroup\x00') semctl$GETZCNT(r3, 0xfffffffffffffffb, 0xf, &(0x7f0000000140)=""/23) 12:09:17 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) syz_mount_image$bfs(&(0x7f00000001c0)='bfs\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0xa, &(0x7f0000000e40)=[{&(0x7f0000000840)="1d5a0c825c67c6b229f2f1a528bfdedbd465fcd1b265d33f6333f0e7066721178a567d0b88d3204da5d40fc07789c638dee4dd2cb127ec21d3494d1897dbea2b050990b586d743cf28241c005b210c78947adb8879ce2de001b4ce252920945ec9d97eb16f78382141383846f655071abe3567f601b73c3392de788a2e255c4de8", 0x81, 0x546}, {&(0x7f0000000bc0)="0838cc7dfb9db6fccfb40679461edc47951b304e63ae29c624d7ca00d053d2b0aab821dba77a222fafb4ef555bb98948d1fd9ac77ad97af9e613cca6eefe0efc08d5d2851f5e72805bd10eb1fce2827c486541512eb75bc08928b80cd95fb3dd3b79e04640159f5078e553298c5b9b09bc391a701de108e083bf771ee0707d0646627cb9d424615f7b0ce3f2ee0ea2af04908e877443d32609008ceffd37981ab8e761c2bc6d291f3862c490163b82b39a7f49e68522fa261da25fe0945bec5dc0846758036a7b1762b0979053b8c5e5485dc6a6beb4584a6dd938f1118956", 0xdf, 0x8f1}, {&(0x7f0000000600)="16c06501712535e4721e937f7ae8aa9e8eaa25ff1a599f306b31950c72", 0x1d}, {&(0x7f0000000640)="6ddff251e1ea6090832db243b2ce4fb0e6b7fecd83bb615f3eeeae37837bf9f56744371b5ccd7f4d4e2ebdbf9657518178666483d7", 0x35, 0x2}, {&(0x7f00000006c0)="09af711397fc89b1b846f9fb281c8bee485fca356b719db678cf4bda7467996d3eb93e4e8c", 0x25, 0x3}, {&(0x7f0000000cc0)="d07a494eb634a23ba2cf3dce25f01cf6e71354080c383cb7fbf905510753a3dd95e00e3934c479eb5009aa004bc07faebcf0f34abc84a2af33fcb83d9defbed0a9961e4afb0472e1c520a32d213426306998ed330c8ce5abb47f607b2eeee6baeaa41fda20c48799bf175d437daab68a701da5829319551c203f0c3175bd4735d22e0a6385", 0x85, 0x2}, {&(0x7f0000000d80)="4f17f944a4eaa859b758cd87ca3fd21121eda2ed48020c8037771062efaf61793d07166ee145829cfcc22d1e3b471dddc7b9b29ba9e581f39db788b635ea712e89867054a3c3d55468edf3278c5909bdacf843fc610dd8125c898afcc832c84808a990c17fc57823ba42eb1713d0aeb18f7afe0dea7b29d716c3336390084e5dd978b80338", 0x85, 0x10000}, {&(0x7f0000000900)="2af82af6586dc21991af8e2d83051e5083a1e7045f045b79af1bff6dacb4204bf901058c82c809e5f00d1eaaa67c0eca6840d518f17b2a37b0efd733e94c7c5734eeacffc92af05f4ad9b6ce3bec0fa423d360d1f93535", 0x57, 0xc5}, {&(0x7f0000000700)="937db2066ce52cae4719f891e856b92255a8103c43c990752e9795ea778ca4185eed2eaac1d2ca94c3eed02e7cb27fea292a1f666d0d4b6271b05b0feab28e", 0x3f, 0x10001}, {&(0x7f0000002040)="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", 0x1000, 0x1}], 0x2, 0x0) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x9}, 0x1c) 12:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x7, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:17 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xb00000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) [ 363.820229] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 363.843153] BFS-fs: bfs_fill_super(): No BFS filesystem on loop6 (magic=a8cb5f16) 12:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x31, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 363.878816] BFS-fs: bfs_fill_super(): No BFS filesystem on loop6 (magic=a8cb5f16) 12:09:17 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x19a, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x74, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfec0000000000000}, 0x1c) 12:09:17 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x1}, {}, 0x0, 0x0, 0x1, 0x1}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1, 0x88, 0x2}}, 0xe8) sendmmsg(r5, &(0x7f0000002000), 0x1, 0x4000000) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) r7 = fcntl$getown(r6, 0x9) perf_event_open(&(0x7f0000000600)={0x5, 0x70, 0x10001, 0x9, 0x81, 0x89c3, 0x0, 0x40, 0x10000, 0x8, 0x1ff, 0x9, 0x800, 0x3, 0x9, 0x1, 0x7, 0x8, 0xaa, 0x401, 0x3, 0x8, 0x2, 0x3ff, 0x8, 0x1, 0x0, 0x7, 0x1f, 0xffffffff, 0x4, 0x5, 0x4, 0xffff, 0xdc0, 0x7, 0x1ff, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0xfffffffffffffff9, 0xffff}, 0x4, 0x3, 0x7, 0x5, 0x10001, 0x10000, 0x7}, r7, 0x9, r3, 0x2) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r8, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r8, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:17 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x30, 0x2, 0x0, 0x0, 0x0, 0x9917, 0x4}, 0x1) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000040)=0xcd, 0x4) sendfile(r2, r2, &(0x7f0000000000)=0x8000000000040000, 0x1000000008) socket$inet_udp(0x2, 0x2, 0x0) [ 364.094718] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x32, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:17 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xf401}, 0x1c) 12:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x29, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 364.238962] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:17 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') r2 = gettid() perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x3, 0x3, 0x7, 0x2, 0x0, 0x3f4, 0x2100, 0x8, 0x9, 0x5, 0xc0, 0x7, 0x100000000, 0x4, 0x100000000, 0x5, 0x3, 0x54, 0x5, 0x4, 0x8, 0x94, 0x6, 0x400, 0x1, 0x2, 0x7, 0x7, 0x1, 0x5, 0x81, 0x1a8, 0x101, 0x1, 0xfffffffffffffffe, 0x783e, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x40, 0x5, 0x5, 0x6, 0x100000001, 0x10000, 0x7}, r2, 0xa, r1, 0xa) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x1, 0x400}, 0x8) 12:09:17 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfffffff5}, 0x1c) 12:09:17 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x14, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:18 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x2000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:18 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x100, 0x0) [ 364.683926] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:18 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x273, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:18 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x26c, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x55550000}, 0x1c) 12:09:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x13, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:18 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) bind$vsock_stream(r9, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @reserved}, 0x10) 12:09:18 executing program 1: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000040)={0x5, 0x2, 0x6, 0xffffffff, 0x4}) 12:09:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0xd, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 365.025477] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:18 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000480)={0x80000003, 0x1710, 0x5, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) socketpair$unix(0x1, 0x100000000080005, 0x0, &(0x7f0000000640)) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x2304000000000000}, 0x1c) 12:09:18 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 365.199018] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:18 executing program 4: r0 = eventfd(0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x3, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x62ece51900000000}, 0x1c) 12:09:18 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x1000002, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) r11 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ioctl$KDGKBSENT(r11, 0x4b48, &(0x7f00000001c0)={0x624a, 0x5, 0x5}) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 365.556567] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x600000000000000}, 0x1c) 12:09:18 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xa00, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x29, 0x0, &(0x7f00000050c0)={0x77359400}) [ 365.690675] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1c7, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2a, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:19 executing program 6: r0 = epoll_create1(0x80000) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x3f, 0x0, 0x0, 0x10000003, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f0000000480)='/dev/rtc0\x00', 0x45, 0xd0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x2, 0x2, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f00000001c0)) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000000640)={&(0x7f0000000980)=ANY=[@ANYRES32=0x0], 0x1}, 0x1, 0x0, 0x0, 0x8843}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x2, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xe8030000}, 0x1c) 12:09:19 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x0, {0x5, 0xf73, "6d18def5f13ac91aefcdda6bad10aa7350a95e02f729ff4303c37e4e67b0c019c6aee2a1171921657140a89618da5416eaaea7010124f1714f95def402fc7a55eb81951fa0124ad4449bb4e9f626122b85cd245d29a1fd4f0f774e7f7aa25847073f2f68962db11c6358ba1071aca1ed93ef29e9c73989ad4a8e29ac263f20e831a39a1996bc406d87a9741ab3b962653cf767de72aa0bf504477079a3024d799770614fde689b85976439fa2143ff5ed48487ff5a55ee15f267c14fd66465c262b4b15f6999119aea96b2f8471fa30a1780d0cd58e173860d2f65f454969f7b7c635c069aff04113ecb11933585ac14364a016b6ab143916daa06fe148d1789", 0xfd, 0x44, 0x20, 0xad90, 0x3, 0xfffffffffffff496, 0x80}, r3}}, 0x128) 12:09:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x5, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 365.934090] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:19 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x10000000000001, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) r7 = fcntl$getown(r6, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000480)={0x0, 0x3a, 0x1, @tid=r7}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r8, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r8, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) ioctl$KVM_GET_DEBUGREGS(r10, 0x8080aea1, &(0x7f0000000600)) 12:09:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x142800}, 0x1c) 12:09:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1400, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 366.086301] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:19 executing program 4: r0 = eventfd(0x402000000) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:19 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb23a70e00000000000021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed960d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd935673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x328b1}, 0x1c) [ 366.453739] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:19 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:19 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xffffffffffffffff, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x27b, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xac, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfe800000}, 0x1c) 12:09:20 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:20 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)=0x7) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) 12:09:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:20 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 366.843616] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xe803000000000000}, 0x1c) 12:09:20 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 367.003204] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:20 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r0, &(0x7f0000000000), 0x81) 12:09:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xe}, 0x1c) 12:09:20 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_notify(r6, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:20 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_notify(r6, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 367.351256] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:20 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x730000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:20 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x141, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xaa, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x281400}, 0x1c) 12:09:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:20 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_notify(r6, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:20 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0)=0xfffffffffffffffc, 0x100000000) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000040)={0x9, 0x0, 0x1}) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000080)) [ 367.752199] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:21 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) r7 = semget(0x0, 0x7, 0x2) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r8, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r9}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312a50740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r7, 0x0, 0x0) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:21 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) semget(0x0, 0x7, 0x2) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) sendmsg$can_bcm(r7, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r8}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x91ffffff00000000}, 0x1c) [ 367.907093] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:21 executing program 4: r0 = eventfd(0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x100000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@nodevmap='nodevmap'}]}}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r2, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r2, &(0x7f0000000000), 0x1000000008) munlockall() 12:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:21 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) semget(0x0, 0x7, 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@broadcast, @in6=@loopback}}, {{@in6}}}, &(0x7f0000000680)=0xffffffffffffff88) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x900000000000000}, 0x1c) 12:09:21 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) semget(0x0, 0x7, 0x2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 368.242009] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:21 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xf0ffffff7f0000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:21 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xe5, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x200000000000000}, 0x1c) 12:09:21 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) semget(0x0, 0x7, 0x2) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:21 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xf4, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:21 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getpeername$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:21 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) r6 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r6, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 368.640236] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x6000000}, 0x1c) [ 368.763947] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:22 executing program 4: r0 = eventfd(0xfffffffffffffffd) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:22 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) mq_timedsend(0xffffffffffffffff, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x1802}, 0x1c) 12:09:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:22 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) mq_timedsend(0xffffffffffffffff, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 369.119943] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:22 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x1000000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:22 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xec, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xaaaa}, 0x1c) 12:09:22 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r5, 0x9) mq_timedsend(0xffffffffffffffff, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x6000000, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:22 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1cd, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:22 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TCXONC(r2, 0x540a, 0x7e32) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0xa4ffffff, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 369.569496] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:22 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) r5 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r5, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x4000000000000}, 0x1c) [ 369.692479] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = socket$inet6(0xa, 0x80806, 0x0) ioctl(r2, 0x100000008912, &(0x7f0000000280)="025cc80700145f8f764070") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f000088c000)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x2, 0x0, 0x0, 0xa4ffffff}, 0x20) r3 = eventfd(0x1000) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r3, r4, &(0x7f00000000c0), 0xffffffff) sendfile(r3, r4, &(0x7f0000000000), 0x1000000008) 12:09:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x2000000, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:23 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r5 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r5, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x500000000000000}, 0x1c) 12:09:23 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r5 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r5, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 369.989908] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:23 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x6, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x600, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x8e, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x801000e1}, 0x1c) 12:09:23 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r4, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) r5 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r5, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x2, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:23 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000040)=0x2, 0x4) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x237, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:23 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r5, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 370.506227] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x6, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xb000000}, 0x1c) [ 370.644933] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:24 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000080)=0xffffffffffffffff, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:24 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) socket$inet6(0xa, 0x2, 0x0) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r4, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xb1280300}, 0x1c) 12:09:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0xa4ffffff00000000, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x600000000000000, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 370.883790] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:24 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x504000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x40020000}, 0x1c) [ 370.996453] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x11b, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:24 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r3}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r4, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x1000000, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xe803}, 0x1c) 12:09:24 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_matches\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x8000, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:24 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1b7, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:24 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) getuid() r3 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r3, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 371.455427] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0xffffffa4, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x10}, 0x1c) [ 371.636619] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:24 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:24 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r3 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r3, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x100000000000000, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x2000000000000}, 0x1c) 12:09:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x200000000000000, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 371.767632] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:25 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x30700000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:25 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) r3 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r3, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x9e, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0x103080}, 0x1c) 12:09:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2=0xe0000001}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:25 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r2, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:25 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080), 0x4) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000040)={0xf000, 0x18000}) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x8d, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:25 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r2, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x600]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 372.374207] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x17) 12:09:25 executing program 4: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x88001, 0x0) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x800, 0x48) r2 = eventfd(0x1000206) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r1, 0x3, 0x5, r2}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101002, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x2201, &(0x7f0000000080)=0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r4, &(0x7f00000000c0), 0xffffffff) sendfile(r2, r4, &(0x7f0000000000), 0x1000000008) 12:09:25 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r2, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x2000009c) 12:09:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0xffffffa4]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:25 executing program 6: r0 = epoll_create1(0x80006) socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) r1 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r1, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:26 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xd00000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000100)=@generic={0x2, 0xbe}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f00000001c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f00000000c0)={0x4, r4}) listen(r2, 0x0) [ 372.774814] Unknown ioctl 1075359421 [ 372.780107] Unknown ioctl 1075359421 12:09:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xa2, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x100000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:26 executing program 6: epoll_create1(0x80006) socket(0x1d, 0x0, 0x1116) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = accept(r1, &(0x7f00000000c0)=@un=@abs, &(0x7f0000000000)=0x80) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 12:09:26 executing program 1: gettid() r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@nfc_llcp, &(0x7f0000000140)=0x80, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$KDDELIO(r3, 0x4b35, 0xffffffffffff800b) sendfile(r2, r3, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000180)=0x400000000000001, 0x1000000008) 12:09:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x10, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:26 executing program 6: epoll_create1(0x80006) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x600000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 373.280493] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:26 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:26 executing program 4: r0 = eventfd(0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') times(&(0x7f0000000040)) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x109000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000001c0)=""/216) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x1000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:26 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:26 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 373.505441] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:26 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xa000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x6000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xa3, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:27 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0xa4ffffff]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:27 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x80000) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1e9, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:27 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 374.188488] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x2]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40480, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f00000000c0)=0x922, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:27 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='[\')8(cpuset#\x00', 0xffffffffffffff9c}, 0x10) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140), 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101900, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x81) r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r3, &(0x7f00000000c0), 0xffffffff) sendfile(r2, r3, &(0x7f0000000000), 0x1000000008) 12:09:27 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x6]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 374.347807] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x10001) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:27 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:27 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xe, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:27 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0xa4ffffff00000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x124, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:28 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1f, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:28 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x40) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000001c0)={r1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x1f, 0x1, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$netlink(r4, &(0x7f00000000c0), &(0x7f0000000100)=0xc) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r3, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x200000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x179, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:28 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x39, "9a20868fe8230f3b524485f5a91abf9d732834fea387e08b4e02498648086690281adcf334f1d17aac0d66f1c78230a90d74315e06ba8b50eb"}, &(0x7f0000000100)=0x41) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000140)={r3, @in={{0x2, 0x4e23, @local}}, 0xffffffff, 0x10000}, &(0x7f0000000200)=0x90) [ 375.125107] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x2000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x16000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x1d, r3}, 0x10, &(0x7f0000000140)={&(0x7f00000001c0)=@canfd={{0x3, 0x8, 0x7fff, 0x6}, 0x14, 0x3, 0x0, 0x0, "f4a20807795aa0b6f866ec515ae0903cc2a8fb4144e57c1db8e7216326dee8f9923b70f194b17dded0fbf1b2993422530e86c929d39b57bda3ef882b49497738"}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x20000800) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) getsockopt$inet6_tcp_buf(r2, 0x6, 0xf, &(0x7f0000000280)=""/93, &(0x7f0000000300)=0x5d) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:28 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:28 executing program 4: r0 = eventfd(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) gettid() r2 = syz_open_procfs(r1, &(0x7f0000000240)='pagemap\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x10000, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@mcast1, @in6=@mcast1, 0x4e20, 0x7, 0x4e23, 0x0, 0xa, 0x4b6c46ce16202ecb, 0x80, 0x62, 0x0, 0xee01}, {0x8, 0x400, 0xbd, 0x10000, 0x40, 0xffff00, 0x1ff, 0x6}, {0x0, 0x1f3, 0x6, 0x7ff}, 0x40400, 0x6e6bc0, 0x2, 0x1, 0x2, 0x2}, {{@in=@broadcast, 0x4d4, 0x6c}, 0x0, @in=@local, 0x0, 0x4, 0x1, 0x401, 0x80, 0x100, 0x5}}, 0xe8) sendfile(r0, r2, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r2, &(0x7f0000000000), 0x1000000008) 12:09:28 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x100000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 375.289011] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xd4, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:28 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:28 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xa00000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x200000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 375.477572] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xbc, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:29 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000004c0)={0x1, 0x0, [{0x2000, 0x20, &(0x7f0000000140)=""/32}]}) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socketpair(0x3, 0x0, 0xfd, &(0x7f0000000000)={0xffffffffffffffff}) r4 = gettid() ptrace$getregs(0xe, r4, 0x100, &(0x7f0000000440)=""/115) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000380)=ANY=[@ANYBLOB="0400000000000000005000000000000039003aa164c30000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000150000000000000b700000000000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000400000000000001100000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000003f0000000000000eb00000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) 12:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x2000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:29 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xfffffffc) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) set_tid_address(&(0x7f0000000040)) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:29 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1a6, 0x0, &(0x7f00000050c0)={0x77359400}) [ 376.018236] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x6000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:29 executing program 6: mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(0xffffffffffffffff, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000380)={'team_slave_0\x00', 0x6}) statx(r1, &(0x7f0000000000)='./file0\x00', 0x7000, 0xfff, &(0x7f00000001c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @empty, 0xfffffffffffffffd}, 0xfffffffffffffda9) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000180)=0x100000001, 0x4) listen(r2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES16=r3, @ANYBLOB="000528bd7000fcdbdf250700000008000600fe9300000c00010008000100020000000c000200080009000800000008000400000200001c0002000800070005000000080002004e2400000800040074200000"], 0x58}}, 0x4000) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) write$P9_RUNLINKAT(r2, &(0x7f00000002c0)={0x7, 0x4d, 0x2}, 0x7) 12:09:29 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0x28f, 0x6]) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0xa4ffffff]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:29 executing program 6: mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(0xffffffffffffffff, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) [ 376.244757] team_slave_0: mtu less than device minimum 12:09:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0xa, &(0x7f00000000c0)=[{0x800, 0x8a, 0x10000, 0x7fffffff}, {0x64f, 0x2fcb6162, 0xfffffffffffffff9, 0x5}, {0x8, 0x1, 0xfffffffffffffffc, 0x7}, {0x101, 0x3, 0xffffffff, 0x8f6}, {0x7, 0x0, 0xffffffffffff0001, 0xffff}, {0x6, 0x0, 0x3, 0x48}, {0x1ff, 0x9, 0x3ff, 0x2}, {0x3, 0x1f, 0x0, 0x1182dbd2}, {0x101, 0x10001, 0x2}, {0x1, 0x0, 0x100000001, 0xec45}]}, 0x10) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:29 executing program 6: mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(0xffffffffffffffff, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:29 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x9300, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x600]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 376.334364] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1a9, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x2]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:30 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) 12:09:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) socket$inet6(0xa, 0xa, 0xfffffffffffffff7) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:30 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000040)) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:30 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xb8, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0xb7891e60387e7f1f) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}], 0x2217) [ 376.929824] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x6]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000140)={{&(0x7f00000000c0)=""/18, 0x12}, &(0x7f0000000100)}, 0x20) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) 12:09:30 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x9c, 0x0, &(0x7f0000000140)=[@enter_looper, @register_looper, @reply_sg={0x40486312, {{0x1, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x38, 0x20, &(0x7f0000000040)=[@fda={0x66646185, 0x5, 0x4, 0x37}, @fd={0x66642a85, 0x0, r0, 0x0, 0x2}], &(0x7f0000000080)=[0x30, 0x18, 0x28, 0x28]}, 0x5}}, @increfs_done={0x40106308, r2, 0x3}, @clear_death={0x400c630f, 0x3, 0x1}, @clear_death={0x400c630f, 0x0, 0x3}, @decrefs, @acquire, @exit_looper], 0xf8, 0x0, &(0x7f0000000280)="599441c22661f38d6e70741dd7f4620a958a0739e89446236eaee98f2ff1d124f504438d946704c95a6928493f924a6ad3325605db76723483c382fd8365d7608b99a4f12333e433df6c826b0f9d634c7b5f5092fc7e4a259fe1cd28a8d5a6d1d6ed1793c67bfde0685ca2bd30f556ac34f0b9ec864ca83692d9d18652359d1c23825db22b6902124027cd911637a82d4ac1f98f0b4863998665285ba80ae7a11e28836f3590ca1c6c789366bd1302a9dabd22bef4c611248b8a535275ad72d628a576d821e46a95d061e18ce595d190b6dbb6284ef567c13944d996401aeddf26c5e5abd8c5b2af98f4d5ccc6fe59ee6698c693ea3f6de1"}) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:30 executing program 6: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) creat(&(0x7f0000000140)='./file0\x00', 0x0) 12:09:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x120) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000140)) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)=0x1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x10000001f, &(0x7f0000000180)=0x100000001, 0x7) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 377.113415] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0xffffffa4]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x600000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:30 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x80ffff, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0xa4ffffff00000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 377.245523] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1ff, 0x8000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0xef, @multicast2, 0x4e20, 0x4, 'fo\x00', 0x0, 0x22d, 0x46}, 0x2c) listen(r0, 0x40) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22, 0x2, @loopback}, 0xfffffffffffffcfa) 12:09:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x23a, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x1000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:31 executing program 1: r0 = gettid() r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) fdatasync(r1) r2 = eventfd(0x0) recvmsg$kcm(r1, &(0x7f00000012c0)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000100)=""/215, 0xd7}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x194}, 0x40000000) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x0, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r4, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r2, r4, &(0x7f0000000000), 0x1000000008) 12:09:31 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xfd, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='reno\x00', 0x5) listen(r1, 0x0) getgroups(0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0xee00]) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/tcp\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r5, 0x4) setresgid(r2, r3, r4) sendto$inet6(r0, &(0x7f00000000c0)="91c87a42e5ac07785a0f5fa9730980f3896be750d9c3ef51e78e397da769ac1bae084bd248eda0acc544de910216c7eac2e6bd6d468bbbef37ba4e641775806f14a0837dca7eec0ae8c3a8e101c008c97105b4525bef8c2700000000", 0x5c, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0xffffffffffffffbc) 12:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x2000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x6000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x80000000004e22}, 0x1c) r2 = memfd_create(&(0x7f0000000000)='(}\x00', 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13c, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r3, 0x68c7fe78, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @multicast1}, @ib={0x1b, 0x5, 0xfffffffffffffff4, {"40035d11e595805895141fbf2777f9d0"}, 0x9, 0x4, 0x20}}}, 0x118) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:31 executing program 4: r0 = eventfd(0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r0, r2, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r2, &(0x7f0000000000), 0x1000000008) 12:09:31 executing program 6: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)="6e65742f69676d7000a44ca508000000640027044c62fb50055ec0381e119d9424dcf62a92e91610951d7e9b6517f6d793c21c72539b85746747aef9d338355dd313f168eb8b19b2630f4e5d") preadv(r0, &(0x7f0000000100)=[{&(0x7f00000004c0)=""/154, 0x9a}], 0x1, 0x0) 12:09:31 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xd00, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0xa4ffffff]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 378.080429] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:31 executing program 6: perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0x0, @local, 0x0, 0x0, 'sed\x00'}, 0x2c) 12:09:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = msgget(0x2, 0x202) msgctl$MSG_INFO(r2, 0xc, &(0x7f00000001c0)=""/210) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) rt_sigtimedwait(&(0x7f0000000000)={0x8}, 0x0, &(0x7f00000000c0)={0x77359400}, 0x8) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x600]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:31 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300), 0x0) [ 378.237541] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x22d, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:31 executing program 6: capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000240)) r0 = socket$inet(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000280)="24000000100007031dfffda2f8a2830020200a0009000600001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 12:09:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x600000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x124, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:32 executing program 1: r0 = gettid() r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000100)) r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000040)=0x1, 0x4) sendfile(r2, r3, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r2, r3, &(0x7f0000000000), 0x1000000008) 12:09:32 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmsg(r0, &(0x7f0000014fc8)={&(0x7f0000006ff0)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f000001ef80)=[{0x18, 0x0, 0x7, "441005000097000000"}], 0x18}, 0x0) 12:09:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0xa4ffffff00000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') 12:09:32 executing program 4: r0 = eventfd(0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x800, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000140)={0x101ff, 0x0, &(0x7f0000ffb000/0x4000)=nil}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r2, &(0x7f00000000c0), 0xffffffff) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x1000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:32 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x40500000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x100000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:32 executing program 6: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYRES64], 0x8) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x0) 12:09:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e1f, 0x0, @empty, 0x20}, 0xffffffffffffff4e) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r0, 0xac) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:32 executing program 6: 12:09:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x200000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:32 executing program 6: 12:09:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x242, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xe2, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = open(&(0x7f0000000100)='./file0\x00', 0x22000, 0x180) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f00000001c0)={0xc7, ""/199}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) 12:09:33 executing program 6: 12:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x2]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:33 executing program 1: r0 = gettid() rt_tgsigqueueinfo(r0, r0, 0x34, &(0x7f0000000040)={0x25, 0xfffffffffffffffc, 0x4, 0xffffffffffff0000}) r1 = eventfd(0x7ff) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x401, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000001c0)=0x1000, 0x4) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r4, &(0x7f00000000c0), 0xffffffff) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x8, 0x9, 0x1, 0x10001, 0x4}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000180)={r5, 0x20}, 0x8) sendfile(r1, r4, &(0x7f0000000000), 0x1000000008) [ 379.808485] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:33 executing program 4: r0 = eventfd(0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') accept4$unix(r1, &(0x7f0000000100), &(0x7f0000000080)=0x6e, 0x80000) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000040), 0x10) 12:09:33 executing program 6: msgrcv(0x0, &(0x7f0000000100)={0x0, ""/47}, 0x37, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 12:09:33 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x40000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x6]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400080, 0x162) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x50}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000140)={r3, 0x6}, &(0x7f00000001c0)=0x8) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/135, 0x87}], 0x1, 0x10) 12:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0xffffffa4]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:33 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000003800022002010034000000001"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 379.949087] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x200, 0x400000) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x400000) r3 = geteuid() write$FUSE_ENTRY(r1, &(0x7f00000001c0)={0x90, 0x0, 0x7, {0x5, 0x0, 0x0, 0x6, 0x100, 0x47334df5, {0x0, 0x5, 0x0, 0x2, 0x6, 0x4, 0x40, 0x89, 0x80000000005, 0x7, 0x1000, r3, 0x0, 0x3, 0x3}}}, 0x90) listen(r1, 0x0) sendto$inet6(r2, &(0x7f00000001c0), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x10000, @loopback}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000280)={0x4, 0x7, 0x7, 0xffffffff, '\x00', 0x8c}) 12:09:33 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x5) sendto$inet6(r1, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 12:09:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x138, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:33 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1c4, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x100000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000000c0)={@mcast2, 0x0}, &(0x7f0000000100)=0x14) bind$packet(r2, &(0x7f0000000140)={0x11, 0x1b, r3, 0x1, 0xadc2, 0x6, @dev={[], 0x1f}}, 0x14) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:33 executing program 6: prctl$seccomp(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xfffffffffffffff9}]}) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") vmsplice(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)}], 0x1, 0x0) 12:09:33 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r1, &(0x7f0000000040)=0x2, 0x3ff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) [ 380.699137] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:34 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0xfd72, 0x7, 0x10001, 0x6, 0x10000000007fff}, 0x14) sendfile(r0, r0, &(0x7f0000000140)=0xfffffffffffffffe, 0xffffffff) flock(r1, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) 12:09:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x200000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:34 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xd000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r0, 0x800000000003) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:34 executing program 5: r0 = socket(0x5, 0x4, 0x40) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000280), 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x5, 0x800) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r3 = memfd_create(&(0x7f0000000100)='cpusetem0mime_type\x00', 0x1) getuid() r4 = getuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) write$FUSE_ATTR(r3, &(0x7f0000000200)={0x78, 0x0, 0x7, {0x2, 0xfffffffffffffff9, 0x0, {0x2, 0x3, 0xfffffffffffffffc, 0x1, 0x8, 0x0, 0x10001, 0x9, 0x9e, 0x9, 0x0, r4, r5, 0x3, 0x20}}}, 0x78) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f00000002c0)={0x77359400}, 0xd) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000001e, &(0x7f0000000180)=0x100000001, 0xfffffe3b) listen(r6, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 380.845364] audit: type=1326 audit(1533470974.118:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25300 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x456cb9 code=0xffff0000 12:09:34 executing program 6: 12:09:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x600000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:34 executing program 6: [ 380.943086] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:34 executing program 5: r0 = signalfd4(0xffffffffffffff9c, &(0x7f00000000c0)={0x6}, 0x8, 0x800) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="3100000000000000658274dd7cc24ddffd5425545c5a0a789e24b24f7e521cb9681358105f3abbd352fe8e5a47ebcc1507e7ac94e25f5112b491756bf506e3e19a000000000000000050e836113e96576ee5415869bed663079ff714e27a94e1f30551929ef20a9740ed5956aa29b3be33014cd502d2796c1c783d3308a3be0879ae2c514f236c930a5e55aab30be9a1acbe15b6568f4459edc222230cf5e57139b03f5398b38fe2482fbcbd8307f0b97435009adff7c6da5d"], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) sendto$inet6(r1, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x6000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 381.106672] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1e9, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:34 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x6a, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:34 executing program 6: 12:09:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x600]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x4000) ioctl$BLKRRPART(r2, 0x125f, 0x0) listen(r1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) process_vm_writev(r3, &(0x7f0000000140), 0x0, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/20, 0x14}, {&(0x7f0000000200)=""/163, 0xa3}, {&(0x7f00000002c0)=""/104, 0x68}], 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f0000000040)="9bcd72ff35cfd04adb7e7c6ab76e566edf203f9c9e0a6b6cbf94bac562a4582f00cb96015804083804ba3dcc609a48be017d32a5db92d61748b0478b99533688fc1a7d09fa4188b5bc305eac0a25fe3c49402f670df4f44275265ad623346add953037fec1d89cdde5a21ba05a4afc4ad769117c2520ff042e74900a667e9eee", 0x80, 0x4000000, &(0x7f0000000100)={0x2, 0x4e22, @multicast1}, 0x10) r1 = gettid() r2 = eventfd(0x0) r3 = syz_open_procfs(r1, &(0x7f0000000140)="706167656d617000c7d17d0a24576a368a849ade42e27590e97cd7429a13b508eba4f67071b0fd8bfc57ca053cdab08d44ad6046dc812f5ebaa11d083d351b") sendfile(r2, r3, &(0x7f00000000c0), 0xffffffff) sched_setattr(r1, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r2, r3, &(0x7f0000000000), 0x1000000008) [ 381.604079] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:34 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0xb5e0, 0xfffffffffffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x1000}, &(0x7f0000000140)=0x8) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:34 executing program 6: 12:09:35 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x7ffffffff, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x2]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:35 executing program 1: r0 = gettid() r1 = eventfd(0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x4, 0xe8f7, 0x7}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f0000000040)={0x5, 0xffffffffffffff07, 0x9}) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000080)={0x3, r1}) 12:09:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x20200) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000100)={0x0, 0x5, 0x5, &(0x7f00000000c0)=0x5}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:35 executing program 6: 12:09:35 executing program 6: [ 381.782750] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x6]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:35 executing program 6: 12:09:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x22e, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x36, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/46, &(0x7f00000000c0)=0x2e) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:35 executing program 6: 12:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0xa4ffffff]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:35 executing program 6: [ 382.456997] IPVS: length: 46 != 24 [ 382.470940] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 382.514680] IPVS: length: 46 != 24 12:09:35 executing program 4: r0 = eventfd(0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x1000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:35 executing program 6: 12:09:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) 12:09:35 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') openat(r2, &(0x7f0000000040)='./file0\x00', 0x200000, 0x100) sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:35 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x300000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:35 executing program 6: 12:09:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x2000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:36 executing program 6: [ 382.673491] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:36 executing program 6: 12:09:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xf7, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:36 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x3d, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r0, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000000c0)) 12:09:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0xffffffa4]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:36 executing program 6: 12:09:36 executing program 6: 12:09:36 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000040)={0x9, 0x3}) accept$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) 12:09:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r3 = add_key(&(0x7f0000000000)='.dead\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)="5939ec694afd0ac944da6851f1c08d3de2686a58c3f2f889b0ba5356e3da81200a79c9d75d01b284b550c88ca916a2421aadacb5a39dc07cc4d0d6ab761e27a49cbbdcd8454cfef6038f9a24fe253c403d2ad1112fcbf4ac1199ea15125bcf01213ca284ed5d70a33243ab", 0x6b, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r3, 0x16e) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:36 executing program 6: 12:09:36 executing program 1: r0 = gettid() r1 = eventfd(0x2) r2 = socket(0x11, 0x6, 0xe4) recvfrom$packet(r2, &(0x7f0000000100)=""/197, 0xc5, 0x2020, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r1, &(0x7f0000000040), 0x81d) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r3, &(0x7f0000000000), 0x1000000008) 12:09:36 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x10000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:36 executing program 6: r0 = socket$kcm(0x2, 0x800000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xffffffffffffffe6, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f00000019c0)}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) 12:09:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 383.523926] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="59ef3f37f62f9808325838163693b7f856b407ac0d38f026f2c5a99763faebd0db2be454dd2b8e798f61a725c171982bd8db57df1e9d15551c68831069bc8b35dac85022be57b1e1d28f7bc976ff497d08574271636841b048edd7805567874eb54a5b3cacbb23e81ed3832377906dd4af2ccf7cbf437ef106d21d5e29954cf342e4483171c546ca2b518803fe2494504eabb12db1cfedb7594a6ac5551602fe7f1a6afcf3bc1bf63e21e3534055004eaef98ba56f39e8e04913de7fc2e6ac1569092995706a8a0eedefcfb13026", 0xce, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x8cc, @dev={0xfe, 0x80, [], 0xe}, 0x2}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:36 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000001040101ff0080ffffffff2e0a00000003000100020000007f0000010c000400000079e6fef90000"], 0x2c}}, 0x0) [ 383.653633] netlink: 24 bytes leftover after parsing attributes in process `syz-executor6'. 12:09:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x24f, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:37 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x24e, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept4$unix(r0, &(0x7f0000000100), &(0x7f00000001c0)=0x6e, 0x80000) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000200)=""/4096) listen(r1, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x202, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000000c0)=[0x3ff, 0x8]) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:37 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xffefffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) writev(r1, &(0x7f0000001400)=[{&(0x7f0000001380)="b9", 0x1}], 0x1) 12:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 384.177203] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:37 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0x7) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:37 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x8000000004007fc, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffff9c, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 12:09:37 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv4_newroute={0x1c, 0x18, 0x301}, 0x1c}}, 0x0) 12:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:37 executing program 1: r0 = gettid() r1 = eventfd(0xfffffffffffdfffd) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x200006, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000040)={0x0, 0xffffffffffffff9c}) [ 384.409526] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:37 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xc00, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:37 executing program 6: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500)='*', 0x1, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r0, &(0x7f0000000bc0)=""/240, 0xf0) 12:09:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x600]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:37 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RSTATFS(r0, &(0x7f00000000c0)={0x43, 0x9, 0x2, {0x80000000, 0x4, 0xf6, 0x8001, 0xf7ff, 0x2, 0x3, 0x8, 0x6}}, 0x43) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:37 executing program 6: msgrcv(0x0, &(0x7f0000000100)={0x0, ""/47}, 0x37, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 384.557699] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x173, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1c1, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x7) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000000)={@broadcast, @multicast2, @multicast1}, &(0x7f00000000c0)=0xc) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) fstatfs(r1, &(0x7f0000000340)) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x5, 0x40) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f00000002c0)={r4, 0x8}, 0x8) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20000, 0x0) sendto$unix(r5, &(0x7f00000001c0)="42abdac1100bf459543ee8b93f5b2f3c324be38909c6504f071c7e91a8e8299b536de94f054ded18b50d7ea520123accce70f14cbbaf4589f93806f0a52683a5a138d3b1a730885e6ddb087eb2", 0x4d, 0x4040001, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x80000, 0x0) 12:09:38 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002f40)={&(0x7f0000000140), 0xc, &(0x7f0000002f00)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001900010800000000000000000a00000000000000000000000c00090008000000549d9986c2f1bd3a66812bba30a78f3980cbfafaea7d9d07bd68334e2634", @ANYRES32=0x0], 0x2}}, 0x0) 12:09:38 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x10, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}, {@allow_other='allow_other'}]}}) r3 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff10fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r4, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r5 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r5}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000040)=0x5) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r7, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) [ 385.103157] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x6]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:38 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6) 12:09:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f00000000c0)=0x8) sendto$inet6(r0, &(0x7f0000000100)="50b28c215ed383ca43e43b6aa5e7c221336b6320cf6d1011d50018c5131797de44106363340ff7d484f357de55c748fe07b8061f3a6681", 0x37, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:38 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x10, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}, {@allow_other='allow_other'}]}}) r3 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff10fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r4, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r5 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r5}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000040)=0x5) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r7, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) [ 385.286411] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:38 executing program 1: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000080), &(0x7f0000000100)=0x14) r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r3, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r2, r3, &(0x7f0000000000), 0x1000000008) 12:09:38 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x500, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:38 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x10, &(0x7f0000000380)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}, {@allow_other='allow_other'}]}}) r3 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000000)="4c0000001200ff10fffefd956fa264b724a6007e00000000000000683540150024001d001fc41180b598be593ab6821148a730bb1aa49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) pipe(&(0x7f0000000800)={0xffffffffffffffff}) ioctl$TCFLSH(r4, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r5 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r5}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r6, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000040)=0x5) r7 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r7, 0x9) r8 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r9 = semget(0x0, 0x7, 0x2) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r10, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r11}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r9, 0x0, 0x0) mq_notify(r8, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) 12:09:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x401, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000000c0)={0x5, 0x7, 0x49, 0x1}) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000000c0)={0x18, 0x0, {0x1, @random="a14ab814f78a", 'ip6_vti0\x00'}}, 0x1e) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGMRU(r2, 0x40047452, &(0x7f0000000000)) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r0, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback, 0xfffffffffffffffe}, 0x1c) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() write$FUSE_CREATE_OPEN(r3, &(0x7f00000001c0)={0xa0, 0xfffffffffffffffe, 0x1, {{0x2, 0x1, 0x1a7, 0xfffffffffffffffc, 0x10001, 0x400, {0x1, 0x7, 0x8b77, 0x7, 0x7fffffff, 0x6, 0x1, 0xc33, 0x800, 0x4, 0x10000, r4, r5, 0x400, 0x3}}, {0x0, 0x5}}}, 0xa0) [ 385.431691] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x50, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:39 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x145, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:39 executing program 6: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000300)={0x80000001, 0x1710, 0x2, 0x4, 0xfffffffffffffffd}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) pipe(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r2, 0x540b, 0x3) sysinfo(&(0x7f0000000b40)=""/104) r4 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@rand_addr=0x20, 0x4e23, 0x4df04b2c, 0x4e24, 0x40, 0xa, 0xa0, 0x20, 0x32, 0x0, r4}, {0x6, 0x7, 0x2, 0x2, 0x5, 0x9, 0x51, 0x2}, {0x0, 0xffffffff, 0xfffffffffffffffb, 0x480000000000000}, 0x1, 0x6e6bb4, 0x2, 0x1, 0x3}, {{@in6=@ipv4={[], [], @rand_addr=0x9607}, 0x4d6, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x0, 0x5, 0x13bb3ad0a9b12188, 0x1, 0x5, 0x0, 0x3}}, 0xe8) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000040)=0x5) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0x8, 0x3, 0x400, 0x7fff}, 0x8) fcntl$getown(r6, 0x9) r7 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x1000, 0x6, 0x4, 0x0, 0x2}) r8 = semget(0x0, 0x7, 0x2) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001840)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000680)=0xfffffffffffffff5) sendmsg$can_bcm(r9, &(0x7f0000001a80)={&(0x7f0000001980)={0x1d, r10}, 0x10, &(0x7f0000001a40)={&(0x7f0000000980)=ANY=[@ANYBLOB="000000e0010000004004da1bf58a8fc0168c37d537f6b14be2bd47ee76aa2d7bb3be99097df5b9a0c1442fd0cd429947ee1ae288fffbfdc4798e8ee265f4947cec0c45a92824235a58b50695c2ea7dd28190d9a61ffa9c81b9eb2a31fd1bc56c8c5a3736a97f295e305a69112b47480cf390cb230a191c63bb30437021a367c01bdfc4bb8e6b322988aac5df8b909de5e78e45ec6c00c30a01a80f8cc2f79930c700ff5dfd81e722a3aaf7c3e6cee170b8f080ccea270816b0404ed160d7460cd501f1e1dbb4d8899a0c57889cf65a13244d678e11a75ac0a3bbc57343d4fe85829714eff30c83dee508f409819404894e16334a872a287a6efb331731aebc3d1f887c6bd0e79532dc4b33d1df23c5050a0997e77aafc02462d47ea0f774585fe9aa72f60080abd93e673a5746ed98b6fbf6847528e213a276651719e741203453d2378f084e303d7312c10740fe2e37f41dbf42aa141723eb28e930843350d691727bdf2a638105831160a36dff612a9f20f94cf6fd34f177df385b44cc7135ac38e516202e17f6052dbe238782cfe848ed4f2492568aa8ad51dc468e21b10d3efcb38951c7"], 0x1}, 0x1, 0x0, 0x0, 0x8844}, 0x0) semctl$IPC_RMID(r8, 0x0, 0x0) mq_notify(r7, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040), &(0x7f00000000c0)}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) preadv(r3, &(0x7f0000000440), 0x0, 0x1000000000) ppoll(&(0x7f00000000c0)=[{r7, 0x8000}], 0x20000000000000a8, &(0x7f0000000200)={0x77359400}, &(0x7f00000005c0)={0x9}, 0x8) mq_timedsend(r7, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) 12:09:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x5, 0x0, 0x85c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0)=0x7, 0x2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000200), &(0x7f00000001c0)=0x4) sysfs$3(0x3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x4}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r3, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r4 = getuid() setuid(r4) 12:09:39 executing program 6 (fault-call:1 fault-nth:0): r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) 12:09:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000005dc0)='./file0\x00', 0x140, 0x22) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000005e00), 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) listen(r1, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000200)=""/43) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 386.073792] FAULT_INJECTION: forcing a failure. [ 386.073792] name failslab, interval 1, probability 0, space 0, times 0 [ 386.085206] CPU: 1 PID: 25731 Comm: syz-executor6 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 386.093716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.103083] Call Trace: [ 386.105698] dump_stack+0x1c9/0x2b4 [ 386.109352] ? dump_stack_print_info.cold.2+0x52/0x52 [ 386.114584] should_fail.cold.4+0xa/0x11 [ 386.118677] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 386.123812] ? __fget+0x4d5/0x740 [ 386.127288] ? ksys_dup3+0x690/0x690 [ 386.131019] ? check_same_owner+0x340/0x340 [ 386.135378] ? lock_acquire+0x1e4/0x540 [ 386.139375] ? fs_reclaim_acquire+0x20/0x20 [ 386.143711] ? lock_downgrade+0x8f0/0x8f0 [ 386.147884] ? check_same_owner+0x340/0x340 [ 386.152226] ? lock_release+0xa30/0xa30 [ 386.156219] ? rcu_note_context_switch+0x730/0x730 [ 386.161175] __should_failslab+0x124/0x180 [ 386.165434] should_failslab+0x9/0x14 [ 386.169252] __kmalloc+0x2c8/0x760 12:09:39 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x6000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 386.172818] ? lock_downgrade+0x8f0/0x8f0 [ 386.176991] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.182554] ? load_msg+0x42/0x320 [ 386.186123] ? proc_fail_nth_write+0x9e/0x210 [ 386.190641] load_msg+0x42/0x320 [ 386.194037] do_mq_timedsend+0x426/0x10e0 [ 386.198226] ? do_mq_timedreceive+0xef0/0xef0 [ 386.202755] ? lock_release+0xa30/0xa30 [ 386.206760] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 386.212323] ? _copy_from_user+0xdf/0x150 [ 386.216500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.222081] ? get_timespec64+0x123/0x190 [ 386.226268] ? timespec_trunc+0x180/0x180 [ 386.230440] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.235993] ? fput+0x130/0x1a0 [ 386.239295] __x64_sys_mq_timedsend+0x228/0x2d0 [ 386.243992] ? __ia32_sys_mq_unlink+0x570/0x570 [ 386.248692] do_syscall_64+0x1b9/0x820 [ 386.252607] ? finish_task_switch+0x1d3/0x870 [ 386.257132] ? syscall_return_slowpath+0x5e0/0x5e0 [ 386.262095] ? syscall_return_slowpath+0x31d/0x5e0 [ 386.267057] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 386.272095] ? __switch_to_asm+0x34/0x70 [ 386.276170] ? __switch_to_asm+0x34/0x70 [ 386.280253] ? __switch_to_asm+0x40/0x70 [ 386.284330] ? __switch_to_asm+0x34/0x70 [ 386.288409] ? __switch_to_asm+0x40/0x70 [ 386.292511] ? __switch_to_asm+0x34/0x70 [ 386.296594] ? __switch_to_asm+0x40/0x70 [ 386.300670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.305532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.310738] RIP: 0033:0x456cb9 12:09:39 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000080)) sendfile(r1, 0xffffffffffffffff, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x1000000008) [ 386.313950] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 386.332867] RSP: 002b:00007f0e03bfdc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f2 [ 386.340598] RAX: ffffffffffffffda RBX: 00007f0e03bfe6d4 RCX: 0000000000456cb9 [ 386.347890] RDX: 0000000000000000 RSI: 00000000200e6000 RDI: 0000000000000013 [ 386.355169] RBP: 00000000009300a0 R08: 0000000020e0b000 R09: 0000000000000000 [ 386.362459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 12:09:39 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x900, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x2]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:39 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='status\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0xa, 0x1}, 0x14) 12:09:39 executing program 6 (fault-call:1 fault-nth:1): r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) [ 386.369741] R13: 00000000004d1ff8 R14: 00000000004c767c R15: 0000000000000000 [ 386.380991] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:39 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 386.510011] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x10c, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x170, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:40 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) 12:09:40 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='pagemap\x00'}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x801}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="100100000500008d2c858a4cf92add2500000000", @ANYRES32=r3, @ANYBLOB="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"], 0x110}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r4 = syz_open_procfs(0x0, &(0x7f0000000300)="6167656d007000895686d9219751ad300e3378f56aa5ce879e73fdb33b2bf364dd94f776240959517798a60600000017f4f2885a212d9e30b73169dc0a4f7eb24a0d41d3343a4ec02ce515e73240f49661c0dbf018e61282f31988032bd06c6f000000") getpeername$inet6(r4, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev}, &(0x7f00000002c0)=0x1c) sendfile(r4, r4, &(0x7f00000000c0), 0x7) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r4, &(0x7f0000000000), 0x1000000008) 12:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000, 0x0) bind$pptp(r2, &(0x7f00000000c0)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:40 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0xff7f0000, 0x0, &(0x7f0000e0b000)) 12:09:40 executing program 1: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') accept4$unix(r1, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e, 0x80000) sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) [ 386.830522] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:40 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x200e6000, 0x0, &(0x7f0000e0b000)) 12:09:40 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x10, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0xa4, &(0x7f0000000240)=[@in={0x2, 0x4e23, @rand_addr=0x9}, @in6={0xa, 0x4e21, 0x9, @mcast1, 0x2}, @in6={0xa, 0x4e23, 0x7f, @ipv4={[], [], @multicast1}, 0x20}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e23, 0x4, @loopback, 0x9}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}, @in={0x2, 0x4e23, @local}]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000380)={r3, 0x193, 0x2, [0x0, 0x2]}, 0xc) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r0, 0x80000008) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x4, 0x4) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000100)=""/114, &(0x7f00000001c0)=0x72) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) 12:09:40 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000000280)=""/4096, &(0x7f0000000040)=0x1000) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:40 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0xff7f, 0x0, &(0x7f0000e0b000)) 12:09:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x18, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:40 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x227, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:40 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x100, 0x0) fdatasync(r0) r1 = eventfd(0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) bind$vsock_dgram(r2, &(0x7f00000001c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) sendfile(r0, r2, &(0x7f0000000000)=0x800000, 0x1000000008) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x3, 0x20}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r4, 0x1000, 0x30}, 0xc) ptrace$cont(0xffffffffffffffff, r3, 0x6, 0x1) r5 = shmget$private(0x0, 0x1000, 0x420, &(0x7f0000ffd000/0x1000)=nil) shmat(r5, &(0x7f0000ffc000/0x3000)=nil, 0x4000) 12:09:40 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x4, 0x0, &(0x7f0000e0b000)) 12:09:40 executing program 5: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000b00)={'nat\x00'}, &(0x7f0000000b80)=0x54) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r3, &(0x7f0000000380)="535549f1ee82ed45328530be6e6952e48d43d0ddfb9d9140645c9a10a4099198d538b6af5e037c3f02535f208ab9de35fa3cce75b59fc83145a937510b", &(0x7f00000003c0)=""/220}, 0x18) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x100000003, 0x4) listen(r2, 0x0) sendto$inet6(r3, &(0x7f0000000a80)="3117aa88c56e7cbac6408f6e12006a0900cff87426", 0x19, 0x20000005, &(0x7f0000000ac0)={0xa, 0x4e20, 0x0, @remote}, 0x1c) r4 = accept4(r1, &(0x7f00000000c0)=@hci, &(0x7f0000000000)=0x80, 0x80800) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x80, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r2, &(0x7f0000000300)={r8, r4, 0xfffffffffffff4d1}) r9 = getpgid(0xffffffffffffffff) r10 = syz_open_dev$mouse(&(0x7f0000001780)='/dev/input/mouse#\x00', 0x0, 0x4000) ioctl$SG_SET_FORCE_PACK_ID(r10, 0x227b, &(0x7f00000017c0)) sendmsg$nl_generic(r4, &(0x7f0000001740)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10120030}, 0xc, &(0x7f0000001700)={&(0x7f0000001800)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="14004a8008008800c405000008001900", @ANYRES32=r9, @ANYBLOB="080061000100000000"], 0x13c8}, 0x1, 0x0, 0x0, 0x811}, 0xc040) process_vm_writev(r9, &(0x7f0000000640)=[{&(0x7f0000000500)=""/50, 0x32}, {&(0x7f0000000540)=""/225, 0xe1}], 0x2, &(0x7f0000000a00)=[{&(0x7f0000000680)=""/87, 0x57}, {&(0x7f0000000700)=""/156, 0x9c}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/19, 0x13}, {&(0x7f00000008c0)=""/176, 0xb0}, {&(0x7f0000000980)=""/105, 0x69}], 0x6, 0x0) 12:09:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:41 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0xff7f000000000000, 0x0, &(0x7f0000e0b000)) 12:09:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x6, 0xfbd, 0x2, 0xfffffffffffff076}, {0x2, 0x111, 0x9, 0x1f}, {0x8000, 0x7, 0x277, 0x20}]}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) mprotect(&(0x7f0000ff4000/0xb000)=nil, 0xb000, 0x2) 12:09:41 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x600e2000000000, 0x0, &(0x7f0000e0b000)) 12:09:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 387.896083] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:41 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xffff8000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:41 executing program 1: r0 = gettid() r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) kcmp(r0, r0, 0x3, r1, r2) r3 = eventfd(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r3, r4, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r3, r4, &(0x7f0000000000), 0x1000000008) 12:09:41 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x400000000000000, 0x0, &(0x7f0000e0b000)) 12:09:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x8000, 0x7, [0x2, 0x7, 0x5, 0x7, 0x100, 0x8, 0x0]}, &(0x7f0000000100)=0x16) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={r3, 0x100000001}, &(0x7f00000001c0)=0x8) [ 388.229274] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:41 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x24a, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:41 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x22d, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:41 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0xffc99a3b, 0x0, &(0x7f0000e0b000)) 12:09:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'bcsf0\x00', 0xfffffffffffffff8}) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:41 executing program 4: r0 = eventfd(0x80000000000000) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:41 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x3b9ac9ff, 0x0, &(0x7f0000e0b000)) 12:09:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 388.637680] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000100)={{0xa, 0x4e20, 0x0, @remote, 0x98}, {0xa, 0x4e23, 0x1, @mcast2, 0x5}, 0x40, [0x9, 0x80000000, 0x2, 0x1, 0x7fffffff, 0xfa5e, 0x0, 0x7]}, 0x5c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @remote}, 0x1c) 12:09:42 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x225c17d03, 0x0, &(0x7f0000e0b000)) 12:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:42 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x400000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = dup3(r1, r0, 0x80000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f00000001c0)={{0x7, 0x5, 0x7, 0x4, 'syz0\x00', 0x4213}, 0x5, 0x0, 0x5, r3, 0x8, 0x4, 'syz1\x00', &(0x7f00000000c0)=['procuser[ppp0{$\x00', '/}]\x00', '+\x00', 'self\x00', 'ppp0[\'\x00', "6b657972696e6776626f786e6574318800", "65746830d83a47504c00", 'nodevcpuset:\x00'], 0x4a, [], [0x20, 0x1, 0x97f0, 0xb9f]}) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:42 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000280)=""/4096) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) 12:09:42 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0xffc99a3b00000000, 0x0, &(0x7f0000e0b000)) 12:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:42 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xa6, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:42 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x220, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2082, 0x0) write$tun(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="000000100182b7a9040000000900aaaaaaaaaaaaaaaaaaaaaaaa000c001a00020000aab0bec55913ba011efaeac3af749c06372e5b72d60aa2391f8179732200083e06c530e89d86100e46ba42b4e0ff3a6cfa882d6552733d6bbc6910752979168510cdbb53f4771df40417a0efb48a527224000000000000000000000000"], 0x2c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x101000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000140)={0x4, 0x6, 0x8, 0x1}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r2, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40a400, 0x0) 12:09:42 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x37dc12502000000, 0x0, &(0x7f0000e0b000)) 12:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:42 executing program 4: r0 = eventfd(0x40000000007) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, r2, 0x30, 0x1, @ib={0x1b, 0x94, 0x7fff, {"3567c1ee2fb0b8906a107c23d5e9143b"}, 0x7ff, 0xad66, 0x7}}}, 0xa0) 12:09:42 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x600e20, 0x0, &(0x7f0000e0b000)) [ 389.520617] Unknown ioctl 1075343564 [ 389.534063] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 389.605020] Unknown ioctl 1075343564 12:09:42 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x4000000, 0x0, &(0x7f0000e0b000)) 12:09:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffff, 0x2) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:43 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xf000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:43 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x4, &(0x7f0000e0b000)) 12:09:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioctl$fiemap(r1, 0xc020660b, &(0x7f00000001c0)={0x8, 0x7fff, 0x4, 0x497b8494, 0x2, [{0x9, 0x2, 0x5, 0x0, 0x0, 0x81}, {0x100000000, 0x4, 0x10000, 0x0, 0x0, 0x1}]}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x503082, 0x0) openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.threads\x00', 0x2, 0x0) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:43 executing program 1: r0 = gettid() r1 = eventfd(0x0) kcmp(r0, r0, 0x2, r1, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) [ 390.003554] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:43 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x133, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x16d, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:43 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x400000000000000, &(0x7f0000e0b000)) 12:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x501180, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x201, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000140)={r4, 0x9, 0x28, "5bb91de5f1512bb0ee4116a2865aef2d8f9f930f243fb89d7dfe901d34842ecba012941974688c73"}, 0x30) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:43 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:43 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x600e20, &(0x7f0000e0b000)) [ 390.465494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x3f, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:43 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x4000000, &(0x7f0000e0b000)) 12:09:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 390.654339] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:44 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0xc000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:44 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x37dc12502000000, &(0x7f0000e0b000)) 12:09:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x200) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x7d, 0x101, 0x2}, 0xc) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) ioctl$BLKRRPART(r3, 0x125f, 0x0) accept4$bt_l2cap(r3, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x80800) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 390.806535] Unknown ioctl 4703 [ 390.824216] Unknown ioctl 4703 12:09:44 executing program 1: r0 = gettid() r1 = eventfd(0x0) sched_setscheduler(r0, 0x0, &(0x7f0000000140)=0x7fff800000000) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x3ff) sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x1, 0xff, 0x8000, 0x8, 0x9, 0x7af, 0x9, 0x81, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x1d5f, 0x7, 0x1, 0xbd1, 0x100000000, 0x12a2, 0x0, 0xc0, r3}, 0x20) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x101) sendfile(r1, r1, &(0x7f0000000000)=0x100000000000000, 0x1000000008) 12:09:44 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x2b, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:44 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x39, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:44 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xffc99a3b, &(0x7f0000e0b000)) 12:09:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:44 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000001c0)={0x42c5ea84, {{0x2, 0x4e23}}, 0x1, 0x7, [{{0x2, 0x4e23, @remote}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e23, @rand_addr=0x6}}, {{0x2, 0x4e20, @rand_addr=0x101}}, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e20, @rand_addr=0x1}}, {{0x2, 0x4e24, @broadcast}}]}, 0x410) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:44 executing program 4: r0 = eventfd(0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000000)={0x2, 0x0, 0x2, 0x7ff}) r2 = getpid() r3 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)=0x0) accept$inet6(r1, &(0x7f0000000300), &(0x7f0000000500)=0x1c) r6 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xa) sendmsg$unix(r1, &(0x7f0000000480)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000100)="406c4e9735be9438d6974d7809cfcfd7ab7a03cbd164ded47852ad4d85a8f4d2a225aeae8ca33edbc145bd240e0e08b879b90512d58a1f0a8c8ba2e7b8460a55b22fc1e20593b71792b9990a85f5053b565616fdbe7c4738ed78d55e0476597824d7f653da7b1c4f33835201b7c5af2cdde541c32e1473b2b6db61da9a29018ce213c4b8e3e90f784e5a67ef989299119166f2684101b56cea6483bd2627529d1d4bf715459ce305fc5109", 0xab}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000800020000000020000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="000000001000000000000000010000000100000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="13"], 0xc8, 0x10}, 0x50) 12:09:44 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x3b9ac9ff, &(0x7f0000e0b000)) 12:09:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) fchdir(r1) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:44 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x225c17d03, &(0x7f0000e0b000)) 12:09:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 391.455822] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:44 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x1000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:44 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x600e2000000000, &(0x7f0000e0b000)) 12:09:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x41, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) sendto$inet6(r1, &(0x7f00000001c0)="9393584e5d54530ef218f841b7355242de75a2822ee69f0c0d40aaf4b168f4be0a9a2c71a3e4b29e1d1c8d8d2b456a1937affd1a2a54b5d25171b61d56a5f83beeb80970c3ce150492ea71fdf07b4f2bfd672b8f35056cabd7af1ed11b7e2a6ee9a0505d2ab7fb22dc2d140b7e23d70af5ee9e2e920ec3cd2b49d2d3dc616b1f683bda81b1a258879ffee39dc0e67ef49323aba33d88aaac5774656c48b47bd10df2fe4e5fe04fa5f82daf8d32662816127163767dbcd534ba62d34a1196952ec6272ba312fb786c90c6fe8d74dae976bdd3a5be250f29316e4705e60a0aea83493aa1368db6", 0xe6, 0x80, &(0x7f0000000100)={0xa, 0x4e20, 0x260f, @local, 0x80}, 0x1c) r2 = fcntl$dupfd(r1, 0x406, r0) write$FUSE_POLL(r2, &(0x7f00000000c0)={0x18, 0x0, 0x877, {0x3}}, 0x18) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x5, @remote, 0x4}, 0x1c) 12:09:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:45 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000080), &(0x7f0000000100)=0x4) r1 = gettid() r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r3, &(0x7f00000000c0), 0xffffffff) sched_setattr(r1, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) 12:09:45 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x197, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:45 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xd6, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x10000000001, @local, 0x2}, 0xfffffe8e) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) prctl$getname(0x10, &(0x7f0000000b00)=""/128) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x8, 0x2) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r3, 0x7, 0x3}, &(0x7f0000000240)=0xc) listen(r1, 0x7) 12:09:45 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xff7f, &(0x7f0000e0b000)) 12:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:45 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x200) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x20) linkat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x400) r2 = eventfd(0x0) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3ff, 0x40) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r2, r4, &(0x7f00000000c0), 0xffffffff) sendfile(r2, r4, &(0x7f0000000000), 0x1000000008) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000280)={0x9, 0x108, 0xfa00, {r5, 0xd3, "738c65", "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"}}, 0x110) 12:09:45 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x200e6000, &(0x7f0000e0b000)) 12:09:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)="6e65742f6970365f6d725f76696600088a7d3c1e2b91474646fae25af26ce5665c4798f39e8ef040ad25145ef383c51603cafab3d49c45131543deb7b345fe81ba5034aeeabff45a6b760d8de9a8da360c5ae65db330") r3 = syz_open_procfs(0x0, &(0x7f0000000700)="6f6f6d5f61646a00000026e7080900000000") sendfile(r3, r2, &(0x7f0000000000)=0x37, 0x2) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:45 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xffc99a3b00000000, &(0x7f0000e0b000)) 12:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 392.348640] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:45 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x2, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:45 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xff7f000000000000, &(0x7f0000e0b000)) 12:09:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000007100)=[{{&(0x7f00000000c0)=@nfc, 0x80, &(0x7f0000001300)=[{&(0x7f00000001c0)=""/113, 0x71}, {}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000001240)=""/135, 0x87}], 0x5, &(0x7f0000001380)=""/120, 0x78, 0x9}, 0x800000000000000}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000001400)=""/110, 0x6e}, {&(0x7f0000001480)=""/164, 0xa4}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/165, 0xa5}, {&(0x7f0000002600)=""/85, 0x55}, {&(0x7f0000002680)=""/46, 0x2e}], 0x6, &(0x7f0000002740)=""/95, 0x5f, 0x6}, 0x4}, {{&(0x7f00000027c0)=@pptp, 0x80, &(0x7f0000003a40)=[{&(0x7f0000002840)=""/116, 0x74}, {&(0x7f00000028c0)=""/65, 0x41}, {&(0x7f0000002940)=""/168, 0xa8}, {&(0x7f0000002a00)=""/32, 0x20}, {&(0x7f0000002a40)=""/4096, 0x1000}], 0x5, &(0x7f0000003ac0)=""/4096, 0x1000, 0x965}, 0xff}, {{&(0x7f0000004ac0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000004dc0)=[{&(0x7f0000004b40)=""/8, 0x8}, {&(0x7f0000004b80)=""/218, 0xda}, {&(0x7f0000004c80)=""/28, 0x1c}, {&(0x7f0000004cc0)=""/92, 0x5c}, {&(0x7f0000004d40)=""/67, 0x43}], 0x5, &(0x7f0000004e40)=""/174, 0xae, 0x6}, 0x400}, {{&(0x7f0000004f00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000007080)=[{&(0x7f0000004f80)=""/60, 0x3c}, {&(0x7f0000004fc0)=""/38, 0x26}, {&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000006000)=""/4096, 0x1000}, {&(0x7f0000007000)=""/114, 0x72}], 0x5, 0x0, 0x0, 0x2}, 0x6}], 0x5, 0x10002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x800000000000192a}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:45 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0xff7f0000, &(0x7f0000e0b000)) [ 392.576143] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x22, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:46 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x22e, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:46 executing program 1: r0 = gettid() r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sched_setattr(r0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x80000000, 0xffff}, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x1000000008) sched_setattr(r0, &(0x7f0000000100)={0x30, 0x6, 0x0, 0x9, 0x0, 0x1, 0x6, 0x3}, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) 12:09:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:46 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa0200, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2100000003000000000000000000000006000000000000000000000000000000007b829fab705a4e0f6070"], 0x21) 12:09:46 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/icmp6\x00') getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x7, 0x9, 0x7, 0x800, 0x4, 0x8, 0xfff, {0x0, @in6={{0xa, 0x4e23, 0x9, @mcast2, 0x7}}, 0x1, 0x8000, 0x81, 0x2, 0x69f}}, &(0x7f0000000080)=0xb0) r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x1000000008) 12:09:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @local, 0x100}, 0xfedc) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:46 executing program 6: mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x6, 0x4000) ioctl$KDADDIO(r0, 0x4b34, 0xffffffffffff8000) mq_open(&(0x7f0000000040)='eth0\x00', 0x2, 0x103, &(0x7f0000000080)={0x8000, 0x5095, 0x5, 0x24, 0x55, 0x8bc, 0x7fffffff, 0x1}) 12:09:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:46 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f00000000c0)={0xff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x9, 0x3, 0x101) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x800}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:46 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) [ 393.281233] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:46 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x7, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:46 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) fcntl$dupfd(r0, 0x0, r0) 12:09:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="72f33bad12fbd9a3c8bd72aa1b8ff181d1d1cdb4378c3e8a5c5dfbdab0ad1a86f4ac4cf1627eeb8d38da30169383c5ec1b8b41c74ede05be167075a265d7ce52a8563a50f663d37c42d8b187740ce7a2fde89b9db49b5885d8c93530687a558c0713987126bdc3bf4c44f3367771294cdb0130bf2e8f9ff19d894adf3e6cdcc5e43703ed02f349c7c36a149840d2cbe2", 0x90, 0x40, &(0x7f0000000100)={0xa, 0x4e24, 0x1, @loopback, 0x7f}, 0x1c) modify_ldt$write2(0x11, &(0x7f0000000000)={0xb1d, 0x20101000, 0xffffffffffffffff, 0x820, 0xfffffffffffffffe, 0x7, 0x400, 0x141, 0x9, 0x7}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:46 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x400) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 12:09:46 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x14e, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:47 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x244, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:47 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008031, 0xffffffffffffffff, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='security.capability\x00', &(0x7f00000002c0)=""/168, 0xa8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f00000000c0), 0x2, 0x3) msync(&(0x7f0000352000/0x4000)=nil, 0x4000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f00000000c0)={0x1a, 0x5, 0x10, 0x18, 0x8, 0xfffffffffffffa50, 0x6, 0xa3, 0xffffffffffffffff}) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000100)={0x1, 0x0, [{0x101, 0x5, 0x0, 0x0, @irqchip={0x96, 0xe778}}]}) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f0000000140)={'ip_vti0\x00', 0x400}) 12:09:47 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) socketpair(0x10, 0x5, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) 12:09:47 executing program 4: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xfffffffffffffffd, 0x1000000008) 12:09:47 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x45c) 12:09:47 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) r1 = memfd_create(&(0x7f0000000040)='eth0\x00', 0x3) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000080)={0x8, 0x80000000, 0x7, 0xfc24}) 12:09:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 394.117627] FAULT_INJECTION: forcing a failure. [ 394.117627] name failslab, interval 1, probability 0, space 0, times 0 [ 394.128989] CPU: 0 PID: 26359 Comm: syz-executor1 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 394.137497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.146867] Call Trace: [ 394.149487] dump_stack+0x1c9/0x2b4 [ 394.153138] ? dump_stack_print_info.cold.2+0x52/0x52 [ 394.158347] ? trace_hardirqs_on+0x10/0x10 [ 394.162608] should_fail.cold.4+0xa/0x11 [ 394.166691] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 394.171810] ? __mutex_lock+0x6d0/0x1700 [ 394.175890] ? mntput_no_expire+0x18e/0xbc0 [ 394.180225] ? do_raw_spin_lock+0xc1/0x200 [ 394.184483] ? uinput_write+0x10f/0x1120 [ 394.188570] ? mutex_trylock+0x2b0/0x2b0 [ 394.192659] ? shrink_dcache_sb+0x350/0x350 [ 394.196996] ? chown_common+0x730/0x730 [ 394.200996] ? lock_acquire+0x1e4/0x540 [ 394.204988] ? fs_reclaim_acquire+0x20/0x20 [ 394.209329] ? lock_downgrade+0x8f0/0x8f0 [ 394.213497] ? _parse_integer+0x13b/0x190 [ 394.217664] ? check_same_owner+0x340/0x340 [ 394.222006] ? rcu_note_context_switch+0x730/0x730 [ 394.226972] __should_failslab+0x124/0x180 [ 394.231222] should_failslab+0x9/0x14 [ 394.235043] kmem_cache_alloc_trace+0x2cb/0x780 [ 394.239763] input_allocate_device+0xaf/0x370 [ 394.244280] ? input_devices_seq_start+0x110/0x110 [ 394.249228] ? __fget+0x4d5/0x740 [ 394.252708] uinput_write+0x837/0x1120 [ 394.256615] ? proc_fail_nth_write+0x9e/0x210 [ 394.261126] ? uinput_dev_erase_effect+0x200/0x200 [ 394.266086] ? kasan_check_read+0x11/0x20 [ 394.270251] ? do_raw_spin_unlock+0xa7/0x2f0 [ 394.274684] __vfs_write+0x117/0x9d0 [ 394.278409] ? __fget_light+0x2f7/0x440 [ 394.282397] ? uinput_dev_erase_effect+0x200/0x200 [ 394.287355] ? kernel_read+0x120/0x120 [ 394.291255] ? vfs_write+0x2f3/0x560 [ 394.294991] ? wait_for_completion+0x8d0/0x8d0 [ 394.299591] ? lock_release+0xa30/0xa30 [ 394.303584] ? fsnotify_first_mark+0x350/0x350 [ 394.308179] ? __fsnotify_parent+0xcc/0x420 [ 394.312519] ? fsnotify+0x14e0/0x14e0 [ 394.316336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.321885] ? security_file_permission+0x1c2/0x230 [ 394.326914] ? rw_verify_area+0x118/0x360 [ 394.331097] vfs_write+0x1fc/0x560 [ 394.334651] ksys_write+0x101/0x260 [ 394.338301] ? __ia32_sys_read+0xb0/0xb0 [ 394.342383] __x64_sys_write+0x73/0xb0 [ 394.346286] do_syscall_64+0x1b9/0x820 [ 394.350189] ? finish_task_switch+0x1d3/0x870 [ 394.354705] ? syscall_return_slowpath+0x5e0/0x5e0 [ 394.359648] ? syscall_return_slowpath+0x31d/0x5e0 [ 394.364593] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 394.369624] ? __switch_to_asm+0x34/0x70 [ 394.373697] ? __switch_to_asm+0x34/0x70 [ 394.377769] ? __switch_to_asm+0x40/0x70 [ 394.381843] ? __switch_to_asm+0x34/0x70 [ 394.385917] ? __switch_to_asm+0x40/0x70 [ 394.389990] ? __switch_to_asm+0x34/0x70 [ 394.394081] ? __switch_to_asm+0x40/0x70 [ 394.394929] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 394.398158] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 394.398179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.398195] RIP: 0033:0x456cb9 [ 394.421719] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 394.440629] RSP: 002b:00007efeb9bebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 394.448353] RAX: ffffffffffffffda RBX: 00007efeb9bec6d4 RCX: 0000000000456cb9 [ 394.455631] RDX: 000000000000045c RSI: 0000000020000080 RDI: 0000000000000013 12:09:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:47 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x200000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:47 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) syz_open_procfs(r1, &(0x7f0000000080)='oom_adj\x00') mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) 12:09:47 executing program 6: mq_open(&(0x7f00000000c0)='keyring\x00', 0x842, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}}, 0x2, 0x9, 0x20, 0x3, 0x21}, &(0x7f0000000200)=0x98) r2 = accept$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000300)=0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x5, 0x1931}, &(0x7f0000000280)=0x8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) mq_timedsend(r3, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) acct(&(0x7f0000000080)='./file0\x00') [ 394.462913] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 394.470194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 394.477471] R13: 00000000004d6cc0 R14: 00000000004ca042 R15: 0000000000000000 12:09:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x1f6, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:47 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000000)="b4dca9ea696e6500") mq_timedsend(r1, &(0x7f0000000180)="98cdb9db22e576c7ce7bd75f", 0xc, 0x9, &(0x7f0000e0b000)) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) 12:09:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x16, &(0x7f0000000200)=0x100000001, 0x4) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000240)=""/115, &(0x7f0000000180)=0x73) listen(r1, 0x0) sendto$inet6(r1, &(0x7f00000001c0), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f00000000c0)={0x100000000, 0x20, 0x5, 'queue1\x00', 0x885e}) r2 = memfd_create(&(0x7f0000000000)='queue1\x00', 0x3) connect$l2tp(r2, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}, 0x0, 0x4, 0x3, 0x2}}, 0x26) 12:09:48 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xee, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:48 executing program 6: r0 = mq_open(&(0x7f0000000040)='eth0\x00', 0x842, 0x71, &(0x7f0000000000)={0x80000000, 0x0, 0x0, 0xfffffffffffffffc}) mq_timedsend(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)) 12:09:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) flistxattr(r0, &(0x7f0000000000)=""/36, 0x24) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) get_thread_area(&(0x7f00000000c0)={0x2, 0x1000, 0xffffffffffffffff, 0x3, 0x4, 0xffffffffffffffcc, 0x3, 0x4, 0x6, 0xd7b6}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:48 executing program 4: r0 = eventfd(0x0) eventfd2(0x101, 0x800) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0), 0xffffffff) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x20000, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000000)="cf239791a11cfed08ba07cba1c3ef53c9aeb0ddae816e625fa1256ff6e7a9c35e5e306f09d6f501632", 0x29) sendfile(r1, r0, &(0x7f0000000080), 0x31) 12:09:48 executing program 1 (fault-call:1 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x45c) 12:09:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:48 executing program 6: socket$nl_generic(0x10, 0x3, 0x10) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000001040)={0x0, 0x0}) mq_timedsend(r0, &(0x7f0000000040)="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", 0x1000, 0x1, &(0x7f0000001080)={r1, r2+30000000}) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) mq_open(&(0x7f00000010c0)='ppp0)\x00', 0x0, 0x10, &(0x7f0000001100)={0x4, 0x6a, 0x4, 0x9, 0x52, 0xd400000000, 0x0, 0x3}) 12:09:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e26, 0x0, @loopback}, 0xfffffffffffffff1) [ 395.120684] FAULT_INJECTION: forcing a failure. [ 395.120684] name failslab, interval 1, probability 0, space 0, times 0 [ 395.132038] CPU: 0 PID: 26439 Comm: syz-executor1 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 395.140619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.149988] Call Trace: [ 395.152597] dump_stack+0x1c9/0x2b4 [ 395.156243] ? dump_stack_print_info.cold.2+0x52/0x52 [ 395.161468] should_fail.cold.4+0xa/0x11 [ 395.165548] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 395.170677] ? __debug_object_init+0x581/0x12e0 [ 395.175369] ? lock_downgrade+0x8f0/0x8f0 [ 395.179532] ? lock_downgrade+0x8f0/0x8f0 [ 395.183698] ? kasan_check_read+0x11/0x20 [ 395.187865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.193413] ? put_dec_trunc8+0x273/0x300 [ 395.197576] ? put_dec+0x3b/0xf0 [ 395.200966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.206522] ? lock_acquire+0x1e4/0x540 [ 395.210510] ? fs_reclaim_acquire+0x20/0x20 [ 395.214847] ? lock_downgrade+0x8f0/0x8f0 [ 395.219019] ? check_same_owner+0x340/0x340 [ 395.223378] ? rcu_note_context_switch+0x730/0x730 [ 395.228334] __should_failslab+0x124/0x180 [ 395.232585] should_failslab+0x9/0x14 [ 395.236410] __kmalloc_track_caller+0x2c4/0x760 [ 395.241111] ? pointer+0x990/0x990 [ 395.244665] ? async_suspend_noirq+0x110/0x110 [ 395.249268] ? kvasprintf_const+0x67/0x190 [ 395.253516] kvasprintf+0xb1/0x140 [ 395.257087] ? bust_spinlocks+0xe0/0xe0 [ 395.261101] ? lockdep_init_map+0x9/0x10 [ 395.265177] ? debug_mutex_init+0x2d/0x60 [ 395.269349] kvasprintf_const+0x67/0x190 [ 395.273431] kobject_set_name_vargs+0x5b/0x150 [ 395.278041] dev_set_name+0xad/0xe0 [ 395.281711] ? device_initialize+0x5f0/0x5f0 [ 395.286162] ? input_allocate_device+0x276/0x370 [ 395.290948] input_allocate_device+0x298/0x370 [ 395.295551] ? input_devices_seq_start+0x110/0x110 [ 395.300506] uinput_write+0x837/0x1120 [ 395.304411] ? proc_fail_nth_write+0x9e/0x210 [ 395.308933] ? uinput_dev_erase_effect+0x200/0x200 [ 395.313881] ? kasan_check_read+0x11/0x20 [ 395.318041] ? do_raw_spin_unlock+0xa7/0x2f0 [ 395.322489] __vfs_write+0x117/0x9d0 [ 395.326219] ? __fget_light+0x2f7/0x440 [ 395.330217] ? uinput_dev_erase_effect+0x200/0x200 [ 395.335165] ? kernel_read+0x120/0x120 [ 395.339083] ? vfs_write+0x2f3/0x560 [ 395.342817] ? wait_for_completion+0x8d0/0x8d0 [ 395.347416] ? lock_release+0xa30/0xa30 [ 395.351411] ? fsnotify_first_mark+0x350/0x350 [ 395.356013] ? __fsnotify_parent+0xcc/0x420 [ 395.360367] ? fsnotify+0x14e0/0x14e0 [ 395.360513] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 395.364179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.364194] ? security_file_permission+0x1c2/0x230 [ 395.364212] ? rw_verify_area+0x118/0x360 [ 395.364228] vfs_write+0x1fc/0x560 [ 395.364245] ksys_write+0x101/0x260 [ 395.364264] ? __ia32_sys_read+0xb0/0xb0 [ 395.400482] __x64_sys_write+0x73/0xb0 [ 395.404389] do_syscall_64+0x1b9/0x820 [ 395.408290] ? finish_task_switch+0x1d3/0x870 [ 395.412801] ? syscall_return_slowpath+0x5e0/0x5e0 [ 395.417740] ? syscall_return_slowpath+0x31d/0x5e0 [ 395.422691] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 395.427722] ? __switch_to_asm+0x34/0x70 [ 395.431796] ? __switch_to_asm+0x34/0x70 [ 395.435871] ? __switch_to_asm+0x40/0x70 [ 395.439944] ? __switch_to_asm+0x34/0x70 [ 395.444015] ? __switch_to_asm+0x40/0x70 [ 395.448109] ? __switch_to_asm+0x34/0x70 [ 395.452183] ? __switch_to_asm+0x40/0x70 [ 395.456257] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.461124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.466322] RIP: 0033:0x456cb9 [ 395.469523] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 395.488439] RSP: 002b:00007efeb9bebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 395.496172] RAX: ffffffffffffffda RBX: 00007efeb9bec6d4 RCX: 0000000000456cb9 [ 395.503453] RDX: 000000000000045c RSI: 0000000020000080 RDI: 0000000000000013 [ 395.510798] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 12:09:48 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x930000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:48 executing program 6: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e21, @local}}, 0x80000000, 0x1, 0x1, 0xffff, 0x40}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e20, 0xc78, @remote, 0x7}}}, 0x84) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000240)={r0}) mq_timedsend(r2, &(0x7f0000000040), 0x0, 0x200, &(0x7f0000e0b000)={0x77359400}) 12:09:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) r2 = semget$private(0x0, 0x1, 0x48) semctl$IPC_STAT(r2, 0x0, 0x2, &(0x7f00000000c0)=""/181) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x39, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:48 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x220000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x80000000, @empty, 0x9}}, 0x80000004, 0x143, 0xfffffffffffff5fd, 0x4, 0xa71}, &(0x7f00000001c0)=0xf9) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000180)={r2, 0x0, 0x3}, 0x8) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) 12:09:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e24, 0x7fffffff, @loopback, 0x40}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in6={0xa, 0x4e22, 0x8, @remote, 0x7}], 0x58) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 395.518091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 395.525375] R13: 00000000004d6cc0 R14: 00000000004ca042 R15: 0000000000000001 [ 395.568037] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:49 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x6c, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:49 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000040)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) 12:09:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f00000000c0)=0x14) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 395.762425] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:49 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000340)={0xfffffffffffffffc, 0x5, 0x7, 'queue1\x00', 0x51ee}) r1 = eventfd(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') bind$vsock_dgram(r0, &(0x7f0000000080)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) sendfile(r1, r2, &(0x7f00000000c0), 0xffffffff) sendfile(r1, r2, &(0x7f0000000000)=0x4, 0x1000000008) 12:09:49 executing program 1 (fault-call:1 fault-nth:2): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x45c) 12:09:49 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xe0002) connect$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x4, 0x0, 0x101, 0x7, 0x1, 0x41}}, 0x8) write$FUSE_NOTIFY_DELETE(r1, &(0x7f00000000c0)={0x37, 0x6, 0x0, {0x0, 0x4, 0xe, 0x0, 'selinuxtrusted'}}, 0x37) 12:09:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000180)=0x100000001, 0x4) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() r4 = geteuid() setresuid(r2, r3, r4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 395.977585] FAULT_INJECTION: forcing a failure. [ 395.977585] name failslab, interval 1, probability 0, space 0, times 0 [ 395.989083] CPU: 1 PID: 26504 Comm: syz-executor1 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 395.997588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.006944] Call Trace: [ 396.009550] dump_stack+0x1c9/0x2b4 [ 396.013203] ? dump_stack_print_info.cold.2+0x52/0x52 [ 396.018409] ? set_precision+0xe0/0xe0 [ 396.022315] should_fail.cold.4+0xa/0x11 [ 396.026399] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 396.031515] ? pointer+0x990/0x990 [ 396.035076] ? async_suspend_noirq+0x110/0x110 [ 396.039683] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 396.044713] ? kvasprintf+0xea/0x140 [ 396.046846] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 396.048436] ? bust_spinlocks+0xe0/0xe0 [ 396.048458] ? lockdep_init_map+0x9/0x10 [ 396.048475] ? debug_mutex_init+0x2d/0x60 [ 396.048499] ? lock_acquire+0x1e4/0x540 [ 396.074942] ? fs_reclaim_acquire+0x20/0x20 [ 396.079279] ? lock_downgrade+0x8f0/0x8f0 [ 396.083442] ? dev_set_name+0xad/0xe0 [ 396.087253] ? check_same_owner+0x340/0x340 [ 396.091595] ? rcu_note_context_switch+0x730/0x730 [ 396.096547] __should_failslab+0x124/0x180 [ 396.100801] should_failslab+0x9/0x14 [ 396.104614] __kmalloc_track_caller+0x2c4/0x760 [ 396.109303] ? uinput_write+0x1e0/0x1120 [ 396.113375] memdup_user+0x2c/0xa0 [ 396.116928] uinput_write+0x1e0/0x1120 [ 396.120829] ? proc_fail_nth_write+0x9e/0x210 [ 396.125336] ? uinput_dev_erase_effect+0x200/0x200 [ 396.130275] ? kasan_check_read+0x11/0x20 [ 396.134428] ? do_raw_spin_unlock+0xa7/0x2f0 [ 396.138853] __vfs_write+0x117/0x9d0 [ 396.142587] ? __fget_light+0x2f7/0x440 [ 396.146580] ? uinput_dev_erase_effect+0x200/0x200 [ 396.151521] ? kernel_read+0x120/0x120 [ 396.155412] ? vfs_write+0x2f3/0x560 [ 396.159142] ? wait_for_completion+0x8d0/0x8d0 [ 396.163733] ? lock_release+0xa30/0xa30 [ 396.167721] ? fsnotify_first_mark+0x350/0x350 [ 396.172310] ? __fsnotify_parent+0xcc/0x420 [ 396.176643] ? fsnotify+0x14e0/0x14e0 [ 396.180461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.186008] ? security_file_permission+0x1c2/0x230 [ 396.191038] ? rw_verify_area+0x118/0x360 [ 396.195212] vfs_write+0x1fc/0x560 [ 396.198765] ksys_write+0x101/0x260 [ 396.202401] ? __ia32_sys_read+0xb0/0xb0 [ 396.206478] __x64_sys_write+0x73/0xb0 [ 396.210373] do_syscall_64+0x1b9/0x820 [ 396.214273] ? finish_task_switch+0x1d3/0x870 [ 396.218786] ? syscall_return_slowpath+0x5e0/0x5e0 [ 396.223730] ? syscall_return_slowpath+0x31d/0x5e0 [ 396.228681] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 396.233704] ? __switch_to_asm+0x34/0x70 [ 396.237776] ? __switch_to_asm+0x34/0x70 [ 396.241848] ? __switch_to_asm+0x40/0x70 [ 396.245922] ? __switch_to_asm+0x34/0x70 [ 396.250006] ? __switch_to_asm+0x40/0x70 [ 396.254095] ? __switch_to_asm+0x34/0x70 [ 396.258171] ? __switch_to_asm+0x40/0x70 [ 396.262251] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.267114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.272315] RIP: 0033:0x456cb9 [ 396.275515] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.294427] RSP: 002b:00007efeb9bebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 396.302148] RAX: ffffffffffffffda RBX: 00007efeb9bec6d4 RCX: 0000000000456cb9 [ 396.309428] RDX: 000000000000045c RSI: 0000000020000080 RDI: 0000000000000013 [ 396.316709] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 396.323987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 396.331265] R13: 00000000004d6cc0 R14: 00000000004ca042 R15: 0000000000000002 12:09:49 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x500000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x20000000000007f, 0x8000) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 12:09:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) 12:09:49 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x202, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:49 executing program 1 (fault-call:1 fault-nth:3): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x45c) 12:09:49 executing program 6: r0 = mq_open(&(0x7f00000000c0)='\x00', 0x842, 0x50, &(0x7f0000000080)={0x9, 0x0, 0x889, 0x0, 0x2, 0x0, 0x1}) mq_timedsend(r0, &(0x7f00000e6000), 0xfffffffffffffc5d, 0x0, &(0x7f0000e0b000)) [ 396.429256] FAULT_INJECTION: forcing a failure. [ 396.429256] name failslab, interval 1, probability 0, space 0, times 0 [ 396.431910] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 396.440603] CPU: 1 PID: 26526 Comm: syz-executor1 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 396.459403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.468760] Call Trace: [ 396.471361] dump_stack+0x1c9/0x2b4 12:09:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @remote}}, 0x6, 0x1b1, 0xfffffffffffffffd, 0x4, 0xc}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000001c0)={r3, 0x6}, &(0x7f0000000200)=0x8) [ 396.474997] ? dump_stack_print_info.cold.2+0x52/0x52 [ 396.480200] ? __kernel_text_address+0xd/0x40 [ 396.484715] should_fail.cold.4+0xa/0x11 [ 396.488801] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 396.493916] ? save_stack+0xa9/0xd0 [ 396.497559] ? save_stack+0x43/0xd0 [ 396.501200] ? kasan_kmalloc+0xc4/0xe0 [ 396.505111] ? __kmalloc_track_caller+0x14a/0x760 [ 396.509963] ? memdup_user+0x2c/0xa0 [ 396.513689] ? uinput_write+0x1e0/0x1120 [ 396.516994] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 396.517759] ? vfs_write+0x1fc/0x560 [ 396.517774] ? ksys_write+0x101/0x260 [ 396.517787] ? __x64_sys_write+0x73/0xb0 [ 396.517809] ? do_syscall_64+0x1b9/0x820 [ 396.543745] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.549127] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 396.554158] ? kvasprintf+0xea/0x140 [ 396.557888] ? bust_spinlocks+0xe0/0xe0 [ 396.561877] ? lockdep_init_map+0x9/0x10 [ 396.565958] ? lock_acquire+0x1e4/0x540 [ 396.569940] ? fs_reclaim_acquire+0x20/0x20 [ 396.574275] ? lock_downgrade+0x8f0/0x8f0 [ 396.578439] ? check_same_owner+0x340/0x340 [ 396.582776] ? rcu_note_context_switch+0x730/0x730 [ 396.587720] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 396.592749] __should_failslab+0x124/0x180 [ 396.596995] should_failslab+0x9/0x14 [ 396.600810] __kmalloc_track_caller+0x2c4/0x760 [ 396.605497] ? uinput_write+0x2fb/0x1120 [ 396.609582] kstrndup+0x5f/0xe0 [ 396.612875] uinput_write+0x2fb/0x1120 [ 396.616777] ? proc_fail_nth_write+0x9e/0x210 [ 396.621283] ? uinput_dev_erase_effect+0x200/0x200 [ 396.626230] ? kasan_check_read+0x11/0x20 [ 396.630391] ? do_raw_spin_unlock+0xa7/0x2f0 [ 396.634810] __vfs_write+0x117/0x9d0 [ 396.638534] ? __fget_light+0x2f7/0x440 [ 396.642526] ? uinput_dev_erase_effect+0x200/0x200 [ 396.647470] ? kernel_read+0x120/0x120 [ 396.651368] ? vfs_write+0x2f3/0x560 [ 396.655106] ? wait_for_completion+0x8d0/0x8d0 [ 396.659702] ? lock_release+0xa30/0xa30 [ 396.663692] ? fsnotify_first_mark+0x350/0x350 [ 396.668287] ? __fsnotify_parent+0xcc/0x420 [ 396.672624] ? fsnotify+0x14e0/0x14e0 [ 396.676440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.681986] ? security_file_permission+0x1c2/0x230 [ 396.687017] ? rw_verify_area+0x118/0x360 [ 396.691190] vfs_write+0x1fc/0x560 [ 396.694746] ksys_write+0x101/0x260 [ 396.698384] ? __ia32_sys_read+0xb0/0xb0 [ 396.702462] __x64_sys_write+0x73/0xb0 [ 396.706369] do_syscall_64+0x1b9/0x820 [ 396.710266] ? finish_task_switch+0x1d3/0x870 [ 396.714776] ? syscall_return_slowpath+0x5e0/0x5e0 [ 396.719724] ? syscall_return_slowpath+0x31d/0x5e0 [ 396.724666] ? prepare_exit_to_usermode+0x3b0/0x3b0 12:09:50 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0xc6, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:50 executing program 6: r0 = mq_open(&(0x7f0000000100)='user\x00', 0x10000, 0x100, &(0x7f0000000000)={0x3ff, 0x4, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x1f, 0x1000}) mq_getsetattr(r0, &(0x7f0000000040)={0x9, 0x66ed, 0x9, 0x100000001, 0x7e6, 0x80000001, 0xed, 0x6}, &(0x7f00000000c0)) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2010, r0, 0x15) 12:09:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x0, 0x4) socket$inet6(0xa, 0x5, 0x8) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 396.729695] ? __switch_to_asm+0x34/0x70 [ 396.733769] ? __switch_to_asm+0x34/0x70 [ 396.737835] ? __switch_to_asm+0x40/0x70 [ 396.741903] ? __switch_to_asm+0x34/0x70 [ 396.745974] ? __switch_to_asm+0x40/0x70 [ 396.750041] ? __switch_to_asm+0x34/0x70 [ 396.754121] ? __switch_to_asm+0x40/0x70 [ 396.758192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.763063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.768270] RIP: 0033:0x456cb9 [ 396.771472] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.790385] RSP: 002b:00007efeb9bebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 396.798110] RAX: ffffffffffffffda RBX: 00007efeb9bec6d4 RCX: 0000000000456cb9 [ 396.805384] RDX: 000000000000045c RSI: 0000000020000080 RDI: 0000000000000013 [ 396.812659] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 396.819939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 12:09:50 executing program 4: r0 = eventfd(0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x9a7, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0}, &(0x7f0000000840)=0xc) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f00000009c0)=[{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000280)="d3c5c33a9ece128971f3c19809b8aa360d91eaf3529fa87f7358ca36e78c6d52812312248e246542143755a672f80c847969dd58efc67c56a350434dae7fd6e8ca02ae193edb3a3cf7b2a99a1b51c09c19e7a6abcfdf90f9576dd4862fd883ee01729c635f42bbb66c65ae9dec33f53d3852363234811eb2ebb62ecea5d4d1d221e3bfe6889b40b8c29132e1f98d1696dcce516a705d0438f58dd2b4cf03e1f38fb767888f80d202f947b800c92cbe20d950b1393beae72e8cc304cd02969690d50c1a7e20ec34ffdcba1d710059b964647a5ac6", 0xd4}, {&(0x7f0000000180)="eca34caa4b94bd371c0f72dbbc2ca2c8a03492aefc9e1f85331a284e9ccd76413a3209a4f87593fff67123306dcab0a88f68baaacbdf8947b6fa6b656fdf", 0x3e}, {&(0x7f00000001c0)="5ab3062b10ff8d35539543e7ab41e3c01945b4593c202784fbbd69b3109ebc5579b274a04cfdf7f5a3098668dd1ed2d3d46bfbc52670509d9023ab37e07f3e63ffe76662246e823bf2bf7045ffcb55b7f5761f51d4a4322ce44833d50532e74c4bd042ee31c8f56af69ec21d4fe9", 0x6e}, {&(0x7f0000000380)="e7dd7034d03ec73d7312c64b1bba66802456af330f981e458987885858724a93a075f9d59acb985809e4284a0954d75dba1b231840c3bea56eb3b5b9da59ffd7add8f6110bf16ce4a2e65b5db998b8b35421", 0x52}, {&(0x7f0000000400)="ceba160d8edd63070bef45e9949ef27c568e74f84d0e23f15de234f4d7ebf4c75f", 0x21}, {&(0x7f0000000440)="4f809b9cb08b12200028c1c6360a120b47cc849f86353596c7136e294b64444fa0eda1cc3d4a687e2a1c2ab2dbbf4f7c80b528e21dc69a5002316357334096f09da2fe6fb9f53b362092893e25d1023100f8592944d6c36d63b6e51184864557277264e96e727f4e51ed70db27fa2d272c71ff515b38516afd3769cee988bb319f7e656b45fa94564c8f5f079894a4c002ef6f089f753fb03aa98a2eb4817ebe9e253d1475655996a1bd1b0958ce2beadfe1a36e2e032752da8cf8e2cd5cca", 0xbf}, {&(0x7f0000000500)="460a56c4ae689692132780d2b52cf7b3e2a606ecec0fda1e89988f", 0x1b}, {&(0x7f0000000540)="b0c53db6c4ca1a444233f86b16b23102c8472da46aacb4727c4d49228a2cc430269255ebdcc68a79ed6206f6d132acc728257d7059eb4ee9c6fd082fb584ca040ca9a1d8a291b9055621cbc7ef2846bc649d0804521c27043ba76bcd69d5fe6f7d87999028049f4a6963f037c31154d15f1b24b7cb4c0b876b7c71539c2e369b650128721b8a960e876cfccb7090dc630f8d0d22ddc9594eabeea805f39ceb2787637bc2b4e7fc9c1c118443ecc20b0aaf3f2d5ce8197ce4b7e9cffe04ff53968c9a640b75d7e5bd481284a5a44f5525d21c4fc1d175f5f4a4bc9588237d2ec7", 0xe0}, {&(0x7f0000000640)="dc9e52e86df959df4751ac4ab7728ef6876379df5cf695b5e2625615b29aaa97ed52a4c456d6aa61c1fbfacc5f64a8ed384f7c10e5d4aac2584f1a49c2ca210dd1b42cc20427bd0fedbe1c5fc690c87e9b3a1327cfde504b1c2119e9727085cd94302613c6a7", 0x66}], 0x9, &(0x7f0000000940)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}], 0x70, 0x40000}], 0x1, 0x4000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/self/net/pfkey\x00', 0x800, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r5, &(0x7f00000000c0), 0x100000001) sendfile(r0, r5, &(0x7f0000000000), 0x1000000008) finit_module(r5, &(0x7f0000000040)="656d30212e5e6c6f267c240e00", 0x1) [ 396.827253] R13: 00000000004d6cc0 R14: 00000000004ca042 R15: 0000000000000003 [ 396.840039] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:09:50 executing program 1 (fault-call:1 fault-nth:4): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x45c) 12:09:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 396.929685] FAULT_INJECTION: forcing a failure. [ 396.929685] name failslab, interval 1, probability 0, space 0, times 0 [ 396.940993] CPU: 1 PID: 26565 Comm: syz-executor1 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 396.949492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.958848] Call Trace: [ 396.961456] dump_stack+0x1c9/0x2b4 [ 396.965103] ? dump_stack_print_info.cold.2+0x52/0x52 [ 396.970307] ? __kernel_text_address+0xd/0x40 [ 396.974812] ? unwind_get_return_address+0x61/0xa0 [ 396.979758] should_fail.cold.4+0xa/0x11 [ 396.983835] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 396.988953] ? save_stack+0xa9/0xd0 [ 396.992603] ? kasan_kmalloc+0xc4/0xe0 [ 396.996507] ? __kmalloc_track_caller+0x14a/0x760 [ 397.001360] ? kstrndup+0x5f/0xe0 [ 397.004836] ? uinput_write+0x2fb/0x1120 [ 397.008942] ? __vfs_write+0x117/0x9d0 [ 397.012854] ? vfs_write+0x1fc/0x560 [ 397.016588] ? ksys_write+0x101/0x260 [ 397.020404] ? do_syscall_64+0x1b9/0x820 [ 397.024480] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.029864] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 397.034898] ? kvasprintf+0xea/0x140 [ 397.038629] ? bust_spinlocks+0xe0/0xe0 [ 397.042623] ? lockdep_init_map+0x9/0x10 [ 397.046704] ? lock_acquire+0x1e4/0x540 [ 397.050691] ? fs_reclaim_acquire+0x20/0x20 [ 397.055031] ? lock_downgrade+0x8f0/0x8f0 [ 397.059211] ? check_same_owner+0x340/0x340 [ 397.063556] ? rcu_note_context_switch+0x730/0x730 [ 397.068507] ? kasan_unpoison_shadow+0x35/0x50 [ 397.073121] __should_failslab+0x124/0x180 [ 397.077377] should_failslab+0x9/0x14 [ 397.081202] kmem_cache_alloc_trace+0x2cb/0x780 [ 397.085900] input_alloc_absinfo+0x86/0xf0 [ 397.090176] uinput_write+0x549/0x1120 [ 397.094103] ? uinput_dev_erase_effect+0x200/0x200 [ 397.099071] ? kasan_check_read+0x11/0x20 [ 397.103243] ? do_raw_spin_unlock+0xa7/0x2f0 [ 397.107673] __vfs_write+0x117/0x9d0 [ 397.111404] ? __fget_light+0x2f7/0x440 [ 397.115395] ? uinput_dev_erase_effect+0x200/0x200 [ 397.120345] ? kernel_read+0x120/0x120 [ 397.124250] ? vfs_write+0x2f3/0x560 [ 397.127993] ? wait_for_completion+0x8d0/0x8d0 [ 397.132593] ? lock_release+0xa30/0xa30 [ 397.136588] ? fsnotify_first_mark+0x350/0x350 [ 397.141193] ? __fsnotify_parent+0xcc/0x420 [ 397.145534] ? fsnotify+0x14e0/0x14e0 [ 397.149352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.154903] ? security_file_permission+0x1c2/0x230 [ 397.159942] ? rw_verify_area+0x118/0x360 [ 397.164102] vfs_write+0x1fc/0x560 [ 397.167659] ksys_write+0x101/0x260 [ 397.171297] ? __ia32_sys_read+0xb0/0xb0 [ 397.175373] __x64_sys_write+0x73/0xb0 [ 397.179272] do_syscall_64+0x1b9/0x820 [ 397.183167] ? finish_task_switch+0x1d3/0x870 [ 397.187679] ? syscall_return_slowpath+0x5e0/0x5e0 [ 397.192630] ? syscall_return_slowpath+0x31d/0x5e0 [ 397.197588] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 397.202624] ? __switch_to_asm+0x34/0x70 [ 397.206695] ? __switch_to_asm+0x34/0x70 [ 397.210769] ? __switch_to_asm+0x40/0x70 [ 397.214845] ? __switch_to_asm+0x34/0x70 [ 397.218921] ? __switch_to_asm+0x40/0x70 [ 397.222997] ? __switch_to_asm+0x34/0x70 [ 397.227077] ? __switch_to_asm+0x40/0x70 [ 397.231174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 397.236036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.241244] RIP: 0033:0x456cb9 [ 397.244448] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 397.263359] RSP: 002b:00007efeb9bebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 397.271092] RAX: ffffffffffffffda RBX: 00007efeb9bec6d4 RCX: 0000000000456cb9 [ 397.278373] RDX: 000000000000045c RSI: 0000000020000080 RDI: 0000000000000013 [ 397.285656] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 397.292933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 397.300213] R13: 00000000004d6cc0 R14: 00000000004ca042 R15: 0000000000000004 [ 397.307629] ------------[ cut here ]------------ [ 397.312426] input_alloc_absinfo(): kcalloc() failed? [ 397.317862] WARNING: CPU: 1 PID: 26565 at drivers/input/input.c:487 input_alloc_absinfo+0xc1/0xf0 12:09:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f00000001c0)=0x2) sendmmsg$unix(r2, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)=[@rights={0x18, 0x1, 0x1, [r4]}], 0x18}], 0x4924924924926c2, 0x0) recvmmsg(r3, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x75, 0x0, &(0x7f00000050c0)={0x77359400}) 12:09:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x100000001, 0x4) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x3db, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x3, 0x328, [0x0, 0x200001c0, 0x200001f0, 0x200002f0], 0x0, &(0x7f0000000000), &(0x7f00000001c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x30, 0x89bf, 'bridge_slave_0\x00', 'veth0\x00', 'veth1\x00', 'veth1_to_bond\x00', @local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x1f}, [0x0, 0x4f0ec9704099d9e9, 0xff, 0x0, 0xff, 0xff], 0x70, 0xa0, 0xd0}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7fffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x3, 0x1, 0xe917, 'gretap0\x00', 'bcsf0\x00', 'rose0\x00', 'bcsf0\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @remote, [0x0, 0xff, 0x0, 0xff, 0xff], 0xe0, 0xe0, 0x110, [@connlabel={'connlabel\x00', 0x8, {{0x1000, 0x2}}}, @statistic={'statistic\x00', 0x18, {{0x0, 0x0, 0x2, 0x20, 0xe87}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}, {{{0x7, 0x4a, 0x600, 'sit0\x00', 'gre0\x00', 'bcsf0\x00', 'nr0\x00', @local, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @random="ddcca886b2a1", [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x9, 0x2, 0x6}}}}]}]}, 0x3a0) 12:09:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 397.326887] Kernel panic - not syncing: panic_on_warn set ... [ 397.326887] [ 397.334271] CPU: 1 PID: 26565 Comm: syz-executor1 Not tainted 4.18.0-rc7-next-20180803+ #31 [ 397.342767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.352130] Call Trace: [ 397.354729] dump_stack+0x1c9/0x2b4 [ 397.358374] ? dump_stack_print_info.cold.2+0x52/0x52 [ 397.363593] panic+0x238/0x4e7 [ 397.366801] ? add_taint.cold.5+0x16/0x16 [ 397.370959] ? __warn.cold.8+0x148/0x1ba [ 397.375039] ? input_alloc_absinfo+0xc1/0xf0 12:09:50 executing program 3: r0 = eventfd(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00') sendfile(r0, r1, &(0x7f00000000c0)=0x800000000000000, 0xffffffff) sendfile(r0, r1, &(0x7f0000000000)=0xc000000, 0x1000000008) 12:09:50 executing program 6: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x842, 0x0, &(0x7f0000000000)) ftruncate(r0, 0x4) mq_timedsend(r0, &(0x7f00000e6000), 0x0, 0x0, &(0x7f0000e0b000)) [ 397.379470] __warn.cold.8+0x163/0x1ba [ 397.383369] ? input_alloc_absinfo+0xc1/0xf0 [ 397.387788] report_bug+0x252/0x2d0 [ 397.391426] do_error_trap+0x1fc/0x4d0 [ 397.395330] ? math_error+0x3e0/0x3e0 [ 397.399142] ? vprintk_default+0x28/0x30 [ 397.403214] ? vprintk_func+0x81/0x117 [ 397.407115] ? printk+0xa7/0xcf [ 397.410412] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 397.415264] do_invalid_op+0x1b/0x20 [ 397.418989] invalid_op+0x14/0x20 [ 397.422462] RIP: 0010:input_alloc_absinfo+0xc1/0xf0 [ 397.427492] Code: 80 3c 11 00 75 38 48 89 83 60 01 00 00 48 85 c0 75 96 e8 22 17 0e fd 48 c7 c6 00 bd 5c 87 48 c7 c7 00 b7 5c 87 e8 8f bb d8 fc <0f> 0b e9 77 ff ff ff 4c 89 e7 e8 80 14 4d fd e9 60 ff ff ff 4c 89 [ 397.446409] RSP: 0018:ffff880193ef7a68 EFLAGS: 00010286 [ 397.451786] RAX: 0000000000000000 RBX: ffff88019381f600 RCX: ffffc90004c23000 [ 397.453156] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 397.459070] RDX: 0000000000040000 RSI: ffffffff816366f1 RDI: ffff880193ef7758 [ 397.459080] RBP: ffff880193ef7a80 R08: ffff8801937f66c0 R09: fffffbfff0ff1238 [ 397.459088] R10: fffffbfff0ff1238 R11: ffffffff87f891c3 R12: ffff88019381f760 [ 397.459095] R13: ffff88019381f600 R14: 0000000000000000 R15: 0000000000000000 [ 397.459122] ? vprintk_func+0x81/0x117 [ 397.459143] ? input_alloc_absinfo+0xc1/0xf0 [ 397.459158] uinput_write+0x549/0x1120 [ 397.459183] ? uinput_dev_erase_effect+0x200/0x200 [ 397.515703] ? kasan_check_read+0x11/0x20 [ 397.519870] ? do_raw_spin_unlock+0xa7/0x2f0 [ 397.524298] __vfs_write+0x117/0x9d0 [ 397.528025] ? __fget_light+0x2f7/0x440 [ 397.532025] ? uinput_dev_erase_effect+0x200/0x200 [ 397.536983] ? kernel_read+0x120/0x120 [ 397.540885] ? vfs_write+0x2f3/0x560 [ 397.544609] ? wait_for_completion+0x8d0/0x8d0 [ 397.549206] ? lock_release+0xa30/0xa30 [ 397.553198] ? fsnotify_first_mark+0x350/0x350 [ 397.557794] ? __fsnotify_parent+0xcc/0x420 [ 397.562137] ? fsnotify+0x14e0/0x14e0 [ 397.565953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.571506] ? security_file_permission+0x1c2/0x230 [ 397.576551] ? rw_verify_area+0x118/0x360 12:09:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 397.580723] vfs_write+0x1fc/0x560 [ 397.584277] ksys_write+0x101/0x260 [ 397.587911] ? __ia32_sys_read+0xb0/0xb0 [ 397.591991] __x64_sys_write+0x73/0xb0 [ 397.595899] do_syscall_64+0x1b9/0x820 [ 397.599794] ? finish_task_switch+0x1d3/0x870 [ 397.604303] ? syscall_return_slowpath+0x5e0/0x5e0 [ 397.609248] ? syscall_return_slowpath+0x31d/0x5e0 [ 397.614199] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 397.619234] ? __switch_to_asm+0x34/0x70 [ 397.623312] ? __switch_to_asm+0x34/0x70 [ 397.627381] ? __switch_to_asm+0x40/0x70 [ 397.631461] ? __switch_to_asm+0x34/0x70 [ 397.635529] ? __switch_to_asm+0x40/0x70 [ 397.639614] ? __switch_to_asm+0x34/0x70 [ 397.643689] ? __switch_to_asm+0x40/0x70 [ 397.647767] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 397.652637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.657840] RIP: 0033:0x456cb9 [ 397.661042] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:09:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) move_pages(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000000c0)=[0x1c, 0x2, 0xfffffffffffffc01, 0x4, 0x1, 0xffffffffffffffff, 0xa632, 0x7, 0x7400000000000000], &(0x7f0000000100)=[0x0, 0x0, 0x0], 0x4) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000440)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x3, 0x10000) [ 397.679978] RSP: 002b:00007efeb9bebc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 397.687705] RAX: ffffffffffffffda RBX: 00007efeb9bec6d4 RCX: 0000000000456cb9 [ 397.694981] RDX: 000000000000045c RSI: 0000000020000080 RDI: 0000000000000013 [ 397.702255] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 397.709539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 397.716828] R13: 00000000004d6cc0 R14: 00000000004ca042 R15: 0000000000000004 [ 397.724450] Dumping ftrace buffer: [ 397.727980] (ftrace buffer empty) [ 397.731671] Kernel Offset: disabled [ 397.735282] Rebooting in 86400 seconds..