ng program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x7530) 04:54:33 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:33 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8)={0x2000000000}, 0x8, 0x80800) readv(r0, &(0x7f0000000080), 0x1000000000000193) 04:54:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x8, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:33 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/148}, {&(0x7f0000000600)=""/73}], 0x100002eb) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f00000007c0)=ANY=[@ANYBLOB="98000000", @ANYRES16=r3, @ANYBLOB="000227bd7000fcdbdf2506000000840004000c000700080002000080000024000700080002afa84f102860e50600ff030000080001000f00000008000300090000000800010014000000440007000800030008000000080001000e0000000800010015000000080004000500000008000400040000000800040009000000080004000400000008000200080000000c00010073797a3100000000"], 0x98}, 0x1, 0x0, 0x0, 0x10}, 0x40) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000000c0)=@get={0x1, &(0x7f00000003c0)=""/203, 0x2}) r4 = request_key(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='\x00', 0xfffffffffffffffd) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000006c0)={@null=' \x00', 0xc, 'lo\x00'}) keyctl$reject(0x13, r1, 0x8000, 0x0, r4) socket$isdn(0x22, 0x3, 0x0) [ 331.230750][T17558] device nr0 entered promiscuous mode 04:54:33 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 331.310440][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:34 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x3) 04:54:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xa, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:34 executing program 1: r0 = syz_open_pts(0xffffffffffffff9c, 0x400000) write(r0, &(0x7f0000000000)="16a85a71ec3dfaddfa5800e9aabc70bf02bbd69d82ea940ecf5083588d2a3318a852031c94936c50e2263aa45fa074b275ea7f4012ea1bc5f46fbc2e03bd58a3a85fa430dfd9671e4a5396c52c93193fbf00738e2ead25ef47829abab24fb6667fed385198e970f6c7094646b776a81257ead21d89ab809d1f93bafc2f1c9e2d6c4321d8b14434f015f2f22a385e508a03b783542aa943801dd461cd2a3ce825586b60a8538e7f8f76", 0xa9) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:34 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) [ 331.673486][T17591] device nr0 entered promiscuous mode 04:54:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x7fdc) 04:54:34 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:34 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80000) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:34 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xc, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 332.181302][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 332.210675][T17605] device nr0 entered promiscuous mode 04:54:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x4) 04:54:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xe, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:35 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xa00, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 332.621790][T17635] device nr0 entered promiscuous mode 04:54:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x803e) 04:54:35 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xb00, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:35 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) readv(r0, &(0x7f000004ffe0)=[{&(0x7f0000000280)=""/128, 0x80}], 0x1) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000180)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x40, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000100)=0x100000000) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000080)) [ 333.027570][T17650] device nr0 entered promiscuous mode 04:54:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xc00, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:35 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x80800) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000240)=0x6) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x1) ioctl$RTC_AIE_OFF(r1, 0x7002) [ 333.138491][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x5) 04:54:35 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xe00, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:35 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x9, 0x8, 0xa41, 0x8, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x3c480000000000}}, 0x4, 0x3, 0x81, 0x91f7, 0x82}, 0x98) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00', 0x3}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) [ 333.566387][T17689] device nr0 entered promiscuous mode 04:54:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x808b) 04:54:36 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'gre0\x00', {0x2, 0x4e24, @multicast2}}) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="73797a30db6c319aea31ed3eb85823063fe74d5788d4e964087d09394f586f61ae3445ea9b5213897ae1e22a70e6b565429fbca10153c847ce4e1570c948f5000000000000"], 0x45) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000200)={0xfffffffffffff801, 0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000300)={0x4, r3}) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x1000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00', 0x3}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:36 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:36 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x52) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000040)) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) [ 333.964455][T17700] device nr0 entered promiscuous mode [ 333.983970][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x7) 04:54:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x2000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:36 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000200)=0x49f, &(0x7f0000000240)=0x2) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x100, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000180)={'veth0_to_hsr\x00', {0x2, 0x4e24, @multicast1}}) io_uring_register$IORING_UNREGISTER_EVENTFD(r2, 0x5, 0x0, 0x0) 04:54:36 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00', 0x3}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) [ 334.380831][T17726] device nr0 entered promiscuous mode 04:54:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x8b80) 04:54:37 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:37 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) ppoll(&(0x7f0000000040)=[{r0}, {r0, 0x8}, {r0, 0x280}, {r0, 0xd8}, {r0, 0x8002}, {r0, 0x4040}], 0x6, &(0x7f0000000080)={0x77359400}, &(0x7f0000000140), 0x8) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x100000000000015e) 04:54:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x8000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>', 0x5}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:37 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xa000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 334.844410][T17748] device nr0 entered promiscuous mode [ 334.868223][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x8) 04:54:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xb000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:37 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>', 0x5}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:37 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 335.297107][T17769] device nr0 entered promiscuous mode 04:54:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x983a) 04:54:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xc000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:38 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>', 0x5}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:38 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000000)='@:vmnet0em0\x00', 0xffffffffffffffff}, 0x30) r1 = signalfd4(r0, &(0x7f0000000080), 0xffffff71, 0x80800) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xe000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:38 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 335.748490][T17790] device nr0 entered promiscuous mode [ 335.785979][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xa) 04:54:38 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x200000) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000040)=0x9540000000000000) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) splice(r0, &(0x7f0000000080), r1, &(0x7f0000000140), 0x6, 0x3) 04:54:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x100000000000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:38 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xb104) 04:54:39 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x200000000000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:39 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) 04:54:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x800000000000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:39 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 336.738654][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xc) 04:54:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:39 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:39 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/128, 0x80}], 0x1) 04:54:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xa00000000000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xc045) 04:54:40 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:40 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x7, 0x202000) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000300), 0x4) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x80) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xa7, "196d6def9e7776ebd510959bdf8ce8be870cebc87d365f5b6906ae32ad2a5b2d881206247f2802dd5205293fdb441bb91a01038fb7194138d4d425fc93b7d5d55e4b50efed5cd85e90a0408edbc395feff2a3467c50543061570083e9d8928d366216721f639b2aeb5c6a8ee41f7f78e71c7436ad4a89f76aa91e65fbe9768d6d23d2a934eda11270f11ed55b32c258e59f31bd286c5ceca10f4d626438d51e1e0f33bb149cf7f"}, &(0x7f0000000040)=0xaf) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e20, 0x2, @rand_addr="55e32dfc329ef72cade8c126509b1087", 0xf0000000000}}, 0x2, 0x7, 0x3, 0x0, 0x40}, &(0x7f0000000080)=0x98) 04:54:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xb00000000000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:40 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00 \x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xc00000000000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 337.650614][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:40 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xe) 04:54:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:40 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40000, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x1, 0x40003, @start={0x5}}) signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x6186d7e0aa617a8c, 0x80800) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) 04:54:40 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xe00000000000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xdc7f) 04:54:41 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0xffffffff00000000, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:41 executing program 1: socket$tipc(0x1e, 0x2, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) r1 = signalfd4(r0, &(0x7f0000000280)={0x8}, 0xffffffffffffff15, 0x807ff) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x220180, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) sendmsg$inet6(r2, &(0x7f00000006c0)={&(0x7f0000000300)={0xa, 0x4e24, 0xe44f, @mcast2, 0x3}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000340)="1b", 0x1}, {&(0x7f0000000380)="648a2edf3859a5abbf41b273cf24adb9015d2f7d3c0d47459f1783fb6c91d8f7fd94645549992ea29542dfb3a840a39d9b46f2e74221bd223e45863885caaccb6f0151d09a9200387473a27189f78e9feec974d93eb0d7682f05a708506aaf3f20600096a34e949d86ba1413c43d879cf2ee5b12de1d0b0a8bcc4ce2d4cb3d4d5d45710a1fb048cf420982dc8f870aaf3638ffceeeac581d30bca3aa17c8d413d1", 0xa1}, {&(0x7f0000000440)="38e98d455dc2d138b903f0e0ddd838edc625b1fe1c45ac8cd985d85155a6328938714ba8ca847259e0f8c3d73d74b1a8f0f0d893b56d7178b9", 0x39}, {&(0x7f0000000480)="c9bc3406b7c59aa512a900985b3b1f3aad55fd8c4e92", 0x16}, {&(0x7f00000004c0)="c9d5faa6d0915ccb1b4ef49f520dca09c677f8429f09219cf40dc19289e4ec7111b9913235bcaab3d60555d5f1aff328cc787eda74077052986a91edbe08418a9f9c4d77fc928dda36bd1afa39c6d0c01d8ea9c56f510dd74c1542b11692125fccf7a2abff3f1eba2328f39f53a8d57ebd829a69d17c6d93e00ebb385e264e6f4e9ad87f027d63882affcfa6a42f", 0x8e}, {&(0x7f0000000580)="2d98669d5ded9903a029c63b6ca16fb104c251ee3cfe4fe97a1cee8106ff79e81d1ffd7e8aa37326b4550a4071482f3c1e48ba12efc9cbe778b96fa7dc172998f88190743468fcb8d7a2da1025e46364a924bbf0b851462503a069a44ac2f935f0eb72bbc12ae7169f6a68d79403832f8f7cc36d4ee77fc4f4dfb0fbcd2e52dff21203777be6d2cdca506ce8638882e3ed3f104dcddb1a225aa9b7f8411ec0f39f244287d92843aa061a87f699d1daa3eb152ce2f74d676832acbcdd9e", 0xbd}], 0x6}, 0x8000) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@mcast1, @dev={0xfe, 0x80, [], 0x23}, @local, 0x7, 0x7, 0x8, 0x100, 0x2, 0x100000, r3}) 04:54:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:41 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:41 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) fremovexattr(r0, &(0x7f0000001140)=@random={'trusted.', '/dev/btrfs-control\x00'}) getgid() r1 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000080)={0x0, 0x4}) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r3 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x4) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000140)=""/4096) [ 338.603648][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf) 04:54:41 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:41 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000000)={0x4f4f, 0x8e1, 0x4, 0x100}) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) syz_emit_ethernet(0x82, &(0x7f0000000300)={@local, @local, [{[], {0x8100, 0x8001, 0x8}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4021, 0x0, @local, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000280)={'broute\x00', 0x0, 0x3, 0x8a, [], 0x7, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/138}, &(0x7f0000000080)=0x78) 04:54:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xe022) 04:54:41 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:41 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8200, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000140)) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x80}], 0x1) 04:54:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:42 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:42 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400080, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000040)={0xc967, 0x3, 0x9, 0x704}) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@sha1={0x1, "f387ba5b3f061a528c122ff5b7caec4d469d1bd0"}, 0x15, 0x2) getsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f00000001c0)={@broadcast}, &(0x7f0000000200)=0x8) [ 339.485259][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x10) 04:54:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:42 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xe803) 04:54:42 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) write$vhci(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xdf) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/112, 0x70}, {&(0x7f0000000140)=""/119, 0x3c}], 0x2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000000c0)='veth1_to_bridge\x00') 04:54:42 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:42 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:42 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000080)) [ 340.368764][T18024] device nr0 entered promiscuous mode [ 340.433919][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x14) 04:54:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:43 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8)={0x1}, 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:43 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xf401) 04:54:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:43 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:43 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) fcntl$notify(r0, 0x402, 0x8) 04:54:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:43 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt(r1, 0x1f, 0x2, &(0x7f0000000140)=""/164, &(0x7f0000000040)=0xa4) 04:54:43 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 341.321028][T18071] device nr0 entered promiscuous mode [ 341.337616][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:44 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x64) 04:54:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:44 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001200)='/proc/self/net/pfkey\x00', 0x403, 0x0) write$FUSE_POLL(r0, &(0x7f0000001240)={0x18, 0x0, 0x1, {0x8}}, 0x18) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/37, 0x25}, {&(0x7f0000000140)=""/146, 0x92}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000040)=""/40, 0x28}], 0x4, 0x0) write$FUSE_BMAP(r0, &(0x7f00000014c0)={0x18, 0x0, 0x6, {0x80000000}}, 0x18) syz_init_net_socket$x25(0x9, 0x5, 0x0) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000001280)=0x8, 0x1) 04:54:44 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xff00) 04:54:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 04:54:44 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:44 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff87, 0x80800) readv(r0, &(0x7f000004ffe0), 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x20000) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) 04:54:44 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) [ 342.180919][T18119] device nr0 entered promiscuous mode 04:54:44 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 342.269647][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x121) 04:54:45 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x80800, 0x0) r1 = signalfd4(r0, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:45 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x20000) 04:54:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, 0x0, 0x0) 04:54:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:45 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:45 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3ff, 0x200902) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000140)={0x3, 0x0, 0x100000001, 0x0, 0x0, [], [], [], 0xe6, 0x3}) 04:54:45 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:45 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) fsetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_default\x00', &(0x7f0000000040)='[em1,@-posix_acl_access}\x00', 0x19, 0x2) [ 343.111482][T18169] device nr0 entered promiscuous mode [ 343.143338][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:46 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x300) 04:54:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:46 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000300)=""/104, 0xfffffebe}, {&(0x7f0000000080)=""/55, 0x37}, {&(0x7f00000002c0)}, {&(0x7f0000000180)=""/225, 0xe1}], 0x3) 04:54:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x51400) 04:54:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, 0x0, 0x0) 04:54:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:46 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x9, 0x6c3f, 0x80, 0xfffffffffffffffd, 0xff, 0x80, 0x7}, 0x1c) 04:54:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 344.013177][T18214] device nr0 entered promiscuous mode [ 344.045453][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:46 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000180)={0x0, @empty, @local}, &(0x7f00000001c0)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@ipv4={[], [], @rand_addr=0x8000}, 0x27, r1}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r2, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:47 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x402) 04:54:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:47 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x800000008000000, @loopback, 0x5}], 0x3c) 04:54:47 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\n\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x140500) 04:54:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, 0x0, 0x0) 04:54:47 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\v\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:47 executing program 1: readv(0xffffffffffffffff, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:47 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\f\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:47 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x180, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) write$binfmt_aout(r0, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], 0xae5) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000140)={0x0, 0x3, 0x3, 0x2, 0xfffffffffffffff9}) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000080)=0xfff) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) [ 344.906209][T18264] device nr0 entered promiscuous mode 04:54:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 344.962913][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:47 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xef1) 04:54:47 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) sendfile(r0, r0, &(0x7f0000000000), 0xa0) pipe2$9p(&(0x7f0000000300), 0x4800) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffff9c}) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x2, 0x7, 0x1, 0x0, 0x11, 0x0, 0x70bd28, 0x20000000000000, [@sadb_lifetime={0x4, 0x7, 0x0, 0x6, 0x7, 0x7ff}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e20, 0x6, @loopback, 0x200}, @in6={0xa, 0x4e23, 0x0, @mcast1, 0x1}}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e20}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d6}]}, 0x88}}, 0x44080) 04:54:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:47 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\r\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x400000) 04:54:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) 04:54:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:48 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xe75, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0x1f, 0x4) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:48 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x0e\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:48 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x10\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 345.786062][T18311] device nr0 entered promiscuous mode 04:54:48 executing program 1: readv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)=""/128, 0x80}], 0x1) [ 345.860013][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf01) 04:54:48 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x800) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x0) 04:54:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:48 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x11\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x800000) 04:54:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) 04:54:49 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x12\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x240000, 0x0) r1 = signalfd4(r0, &(0x7f0000000140)={0x20}, 0x8, 0x80000) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x208000) r3 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x801000, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000='version=9p2000'}, {@loose='loose'}, {@version_9p2000='version=9p2000'}, {@aname={'aname', 0x3d, 'em1&\xdacgroup^vmnet0'}}, {@version_L='version=9p2000.L'}, {@mmap='mmap'}, {@access_client='access=client'}], [{@fsuuid={'fsuuid', 0x3d, {[0x33, 0x37, 0x64, 0x38, 0x0, 0x73, 0x66, 0x77], 0x2d, [0x65, 0x0, 0x77, 0x31], 0x2d, [0x77, 0x37, 0x34, 0x66], 0x2d, [0x30, 0x66, 0x79, 0x36], 0x2d, [0x77, 0x77, 0x38, 0x67, 0x7f, 0x77, 0x39, 0x7d]}}}, {@subj_role={'subj_role', 0x3d, '/dev/input/mice\x00'}}, {@fowner_lt={'fowner<', r3}}, {@obj_user={'obj_user', 0x3d, 'securitybdev'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/kvm\x00'}}, {@uid_eq={'uid', 0x3d, r4}}]}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000180)="8773edc1f50529ce091e8ebd6076d55732ca7748cc7f063319f07d7991fb98a12d673151def931b3031838fa9dace5c503092fab6403dfaca365bdc3c75a52062fe3", &(0x7f0000000040)="921d727cb5f2fc68b1a89bcd8b762e9d88a8d7b762450b61a71c5699", 0x1}, 0x20) 04:54:49 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffffc}, 0x8, 0x80800) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xff, 0x200401) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000080)) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) [ 346.708613][T18358] device nr0 entered promiscuous mode 04:54:49 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00%\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 346.773617][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf11) 04:54:49 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000040)={r1, 0x0, 0x3, 0x531f}) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000140)={0x2, 0x2, 0x101, 0x2}) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0406262ae2407b6c"], 0x4, 0x2) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:49 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1000000) 04:54:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) 04:54:50 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:50 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 347.598979][T18403] device nr0 entered promiscuous mode 04:54:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 347.664342][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:50 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf21) 04:54:50 executing program 2: 04:54:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:50 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x2000000) 04:54:51 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000140)) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x3, 0x4) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000080)=0x100000000, 0x4) 04:54:51 executing program 2: msgget$private(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) r2 = dup2(r0, r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys//slop\xae\xa8\x1a\"\xea\x00+py_tcp\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x001\xa8o@\xa7\xb3+Z\x83\x8b\x13\x0ev\a\x00\x00\x00\x00\x00\x00\x00\x0e\xdd\xb57H\xd5\x16\xca\x17\x17z\xe3I\x04\x8d\r\xda(*\x02\xbc\xc2v\x1c\xcd\xb1\xa6\xa4\xbbDSl\xaa\n)\xe1:\x00\x1c\x10gn\xfa\x90\xcf~\xfaX\xd1[\xd97?O\x810x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8200}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)=@updsa={0x29c, 0x1a, 0x2, 0x70bd26, 0x25dfdbff, {{@in=@loopback, @in6=@mcast1, 0x4e24, 0xf9f, 0x4e20, 0x9, 0xa, 0x20, 0xa0, 0x66, r2, r3}, {@in6=@mcast1, 0x4d2, 0x33}, @in6=@rand_addr="60bc4b9834e3550ce02af549a173fc53", {0x0, 0x6, 0x8, 0x0, 0x26a0, 0x100, 0x7}, {0x1, 0x0, 0x6}, {0xab9, 0x7, 0x2}, 0x70bd28, 0x3501, 0xa, 0x7, 0xffffffffffffffff, 0x4}, [@algo_aead={0xc0, 0x12, {{'gcm_base(ecb(cipher_null),sha256-arm64-neon)\x00'}, 0x3a0, 0x40, "4ac78a4498a8a1672f22f24c6a036d5db782b6f7b2e802f49d99383588cb5e43c964bb76afba8bf536dacac5033de576124c35828bea426fa7a4d337cd6a9d5fa4d93ccd454a16456e95c277809ebff9433ed0506811e063edb2382c7a0d6b933927dd6de9a60d96f400824d29fc535086ef9ed5"}}, @policy_type={0xc}, @algo_crypt={0xd4, 0x2, {{'ctr-camellia-asm\x00'}, 0x458, "5d684a6c00ac60970074fee79a4e1b990ab8078ae9144ae5bb60f6e06c84aacb7482c68f5b6fb643e30380869e0afafefbf678e349bef658150fb7b33af9645cee4520edd73e557538dbb8801c748a7041d0033e96adbe528c61bfbc2295053eef3cbb768d25e9f74ebfbb9ee91a04e38dc77de14228383d676447728e3b270be0564a57cfa08a73f91cdd"}}, @tmpl={0x4}, @tfcpad={0x8, 0x16, 0x7}]}, 0x29c}}, 0x80) 04:54:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:55 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:55 executing program 2: poll(&(0x7f00000002c0)=[{0xffffffffffffffff, 0x80}, {0xffffffffffffffff, 0x1a4}, {}, {}, {}], 0x5, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xa4d, 0x0, 0x0, 0x800e003d6) shutdown(r0, 0x0) [ 353.097728][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf48) 04:54:56 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:56 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x204001, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000040)={0x1c, 0x3, 0x4, 0xc, 0x6, 0x81}) write$P9_RCREATE(r1, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0x80, 0x4, 0x7}, 0x8000}}, 0x18) 04:54:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000800)={0x0, 0x5ee, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/83, 0x53}], 0x1000000000000010}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)=""/145, 0x91}, {0x0}, {0x0}], 0x3}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r5, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) 04:54:56 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:56 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x5, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e24, @rand_addr=0x8001}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffff00000000, 0x4}) ppoll(&(0x7f0000000080)=[{r1, 0x2}, {r0, 0x200}, {r1, 0x101}, {r1}, {r0, 0x9010}, {r1, 0x200}], 0x6, &(0x7f0000000140), &(0x7f0000000180)={0x40}, 0x8) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000240)=0xffff, 0x4) fspick(r1, &(0x7f0000000040)='./file0\x00', 0x1) epoll_pwait(r1, &(0x7f0000000280)=[{}, {}, {}], 0x3, 0x1, &(0x7f00000002c0)={0x2}, 0x8) 04:54:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:56 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:56 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000000)=""/118, &(0x7f0000000080)=0x76) r2 = shmat(0xffffffffffffffff, &(0x7f0000ff5000/0x9000)=nil, 0x4000) shmdt(r2) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xf000000) 04:54:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000600)=[{&(0x7f0000001700)=""/247, 0xf7}, {0x0}, {0x0}, {0x0}], 0x4) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x2769, 0x0, 0x0, 0x800e00506) shutdown(r1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x49, &(0x7f0000000000)="7e06c83c6a5b809ca99a997e", 0xc) recvfrom$inet(r2, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050f) shutdown(r2, 0x0) [ 354.017242][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf4a) 04:54:57 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x717, 0x20040) r1 = signalfd4(r0, &(0x7f0000000000)={0x7}, 0x0, 0x0) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:54:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:57 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000001980)=[{&(0x7f0000000140)=""/91, 0x5b}, {0x0}, {0x0}, {0x0}], 0x4) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000000)=""/201, 0xc9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) 04:54:57 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) 04:54:57 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:57 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x11000000) 04:54:57 executing program 1: readv(0xffffffffffffffff, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='system!\x00'}, 0x10) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000140), &(0x7f0000000180)={0x8}, 0x8) [ 354.943393][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf51) 04:54:58 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:58 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x21}}}, 0x0, 0x5, 0x0, "3e004bb15d09f32b230ccd3436fa222298b85a574b26f05b2e2c1e611827f0c2db341a9fa66a2e36bf4a409cb5fb51b4535cd2d9d803c1db4c59dcfabb380d29d56a15a66b1a047945f53254e6c24650"}, 0xd8) 04:54:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/170, 0xaa}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x2, 0x0, 0x800e00515) recvfrom$inet(r1, 0x0, 0x0, 0x2, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$inet_mreq(r1, 0x0, 0xc, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xd172, 0x2, 0x0, 0x800e0050e) shutdown(r1, 0x0) 04:54:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:58 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x80000) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000080)='veth1_to_hsr\x00'}) socket$alg(0x26, 0x5, 0x0) 04:54:58 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:58 executing program 1: 04:54:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x16000000) 04:54:58 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 355.866581][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf53) 04:54:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x20000, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x400, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r0, r0, r0, r0, r0, r0, r0, r0], 0x8) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000180)=@gcm_256={{0x304}, "f2fa1d37ba07c9f1", "9566a25f0118437d3a9b3dc5a4674d8a10e7253b14112ad9d97aaa65d2f104f3", "3e891fd6", "0811843eb8794476"}, 0x38) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x5, 0x400) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000240)) r3 = signalfd4(r0, &(0x7f0000000000), 0x8, 0x80800) readv(r3, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x9b, 0x2, 0x8, "88ebe73d2080944ba98d88814532e0a1", "8c197cd91bd99338c98f2621fe926d91a42671e029aa6e270b86a2d51551618c38054340566301feccb289eb7649a1f42e53b13a2c92f3826479a0a40c57657add1c154f569eac75a6782f208be2dbd54c62a8a9d729c9d6636af68000c29930a41ecbfbabe9342bcb30da5ca33fd3cb5050b5e3d603b8207ac50ab4eb6cc27dcae8b9f0e373"}, 0x9b, 0x1) 04:54:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000280)=""/130, 0x82}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/20, 0x14}], 0x1}, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) read(r5, &(0x7f0000000440)=""/130, 0x82) shutdown(r4, 0x0) shutdown(r2, 0x0) 04:54:58 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:59 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:59 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) 04:54:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:59 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:59 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = socket$inet(0x2, 0x5, 0x4aa9) getpeername(r1, &(0x7f00000001c0)=@tipc=@name, &(0x7f0000000280)=0x2d4) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r2 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) 04:54:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x2a525e0c) [ 356.834602][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:54:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf5a) 04:54:59 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:54:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:54:59 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffffa}, 0xfffffffffffffc70, 0x801) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x1, 0x0) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x3ece, 0x1) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f00000002c0)={0x20, 0x100000001}) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000240)={0x400}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x6c, r3, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x80000000}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5d0}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ppoll(&(0x7f0000000340)=[{r0, 0x8}, {r1, 0x2000}], 0x2, &(0x7f0000000380), &(0x7f00000003c0)={0xcf}, 0x8) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@null=' \x00', 0x0, 'nr0\x00'}) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000300)=[0x7fff, 0xf10]) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) syz_open_dev$media(&(0x7f0000000440)='/dev/media#\x00', 0x1000, 0x141000) 04:54:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/65, 0x41}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000000)={0x4e}, 0x10) accept4$inet(r0, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x10000002c, 0x0, 0x0, 0x800e0054e) shutdown(r1, 0x0) 04:54:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:00 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:00 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = semget(0x2, 0x0, 0x0) semop(r1, &(0x7f0000000000)=[{0x3, 0x4, 0x1000}, {0x4, 0x5, 0x1800}, {0x3, 0x4, 0x800}, {0x4, 0x4, 0x1000}, {0x3, 0x1}, {0x2, 0x7, 0x1000}], 0x6) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:55:00 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000880)=""/4096, 0x1000}], 0x1}, 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000001980)=[{&(0x7f0000000140)=""/91, 0x5b}, {0x0}, {0x0}, {0x0}], 0x4) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000000)=""/201, 0xc9}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) 04:55:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x30750000) [ 357.772195][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf5c) 04:55:00 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\n\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:00 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x101, 0x1, {0x1, 0x9, 0x9, 0xfffffffffffff001}}) readv(r0, &(0x7f000004ffe0), 0x100000000000009e) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) 04:55:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)=""/170, 0xaa}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x2, 0x0, 0x800e00515) shutdown(r0, 0x0) setsockopt$inet_mreq(r1, 0x0, 0xc, &(0x7f00000003c0)={@loopback, @remote}, 0x8) recvfrom$inet(r1, 0x0, 0xd172, 0x2, 0x0, 0x800e0050e) shutdown(r1, 0x0) 04:55:00 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\v\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:00 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = signalfd4(r0, &(0x7f0000ddeff8)={0x80000001}, 0x8, 0x80800) splice(r1, &(0x7f0000000000), r1, &(0x7f0000000040), 0x5a74f0dc, 0x9) readv(r1, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) openat$cgroup_ro(r0, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) 04:55:01 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\f\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:01 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) socketpair(0x19, 0x6, 0xffffffffffff8001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x2}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={r3, 0x1ff}, 0x8) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000200), &(0x7f0000000240)=0xc) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000040)={@hyper}) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) 04:55:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x3f000000) [ 358.700902][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf5e) 04:55:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/43, 0x2b}, {0x0}, {0x0, 0x3b8}, {0x0}], 0x100000000000000c) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/138, 0x8a}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x3, 0x84) recvmsg(r5, &(0x7f0000001940)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f00000002c0)=""/208, 0xd0}, {0x0}], 0x2}, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) 04:55:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:01 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\r\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:01 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000ddeff8), 0x8, 0x80800) readv(r0, &(0x7f000004ffe0)=[{&(0x7f00000000c0)=""/128, 0x2ee}], 0x2000000000000287) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x20200) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) 04:55:01 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x0e\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000600)=[{&(0x7f0000001700)=""/247, 0xf7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) dup(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2769, 0x0, 0x0, 0x800e00506) shutdown(0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x2) recvfrom$inet(r1, 0x0, 0x1789836bed901fc7, 0x0, 0x0, 0x800e0050f) shutdown(r1, 0x0) 04:55:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:01 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x10\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:02 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00 \x00\x00\x10\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x40000000) [ 359.621667][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf60) 04:55:02 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x11\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000440)="c0dca5055e0bcfec7be070") r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000009040)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x48001) 04:55:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:02 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x12\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'hsr0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'hsr0\x00', 0x1001}) 04:55:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:02 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x10\x00\x00 \x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x41020000) 04:55:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 360.523280][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f00000002c0)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}, {{&(0x7f00000001c0)=@vsock, 0x24a, 0x0}}], 0x2, 0x0) [ 360.634560][T19121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 360.860171][T19121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 04:55:03 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf62) 04:55:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:03 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00%\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x20, r1, 0xa01, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}]}]}, 0x20}}, 0x0) 04:55:03 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000280)) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0xffffffffffffffdc, 0x2) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x8, 0x0) geteuid() 04:55:03 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)={0x20, r1, 0xa01, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x800}]}]}, 0x20}}, 0x0) 04:55:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$usb(0x0, 0x3ff, 0x4000) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)}, &(0x7f0000000380)=0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r1, 0x805, 0x0, 0x0, {{0x1, 0xffffffea}, 0x5, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) 04:55:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x4c1d0000) 04:55:03 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 361.513519][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf64) 04:55:04 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, 0x0) mknod(0x0, 0x0, 0x0) unlink(0x0) execve(0x0, 0x0, 0x0) gettid() timer_create(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = dup(0xffffffffffffff9c) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x339) renameat(r1, &(0x7f00000000c0)='./bus\x00', r0, &(0x7f0000000100)='./bus\x00') openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = dup(r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r3, 0x6, 0x11, &(0x7f0000000080)=0x1, 0x4) r4 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r4, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000280)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r3, r4, 0x0, 0x900000001) connect$unix(r3, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 04:55:04 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x800, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000140)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 04:55:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:04 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) 04:55:04 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x803e0000) 04:55:04 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 362.273017][ T26] audit: type=1800 audit(1561870504.822:35): pid=19213 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16593 res=0 04:55:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 362.349584][ T26] audit: type=1804 audit(1561870504.852:36): pid=19213 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/555/file0" dev="sda1" ino=16593 res=1 04:55:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 362.407235][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf74) 04:55:05 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 04:55:05 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) 04:55:05 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 363.030812][ T26] audit: type=1800 audit(1561870505.582:37): pid=19245 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17792 res=0 [ 363.100577][ T26] audit: type=1804 audit(1561870505.642:38): pid=19245 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/556/file0" dev="sda1" ino=17792 res=1 04:55:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x808b0000) 04:55:05 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:05 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 363.282351][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:06 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf7c) 04:55:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:06 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) 04:55:06 executing program 1: clone(0x1004ffe, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x7f, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 04:55:06 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 363.968249][ T26] audit: type=1800 audit(1561870506.512:39): pid=19292 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17799 res=0 04:55:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 364.042818][ T26] audit: type=1804 audit(1561870506.512:40): pid=19292 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/557/file0" dev="sda1" ino=17799 res=1 04:55:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x8dffffff) 04:55:06 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") sendmsg$nl_netfilter(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000000000000000000000c00000000"], 0x14}}, 0x0) 04:55:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:06 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 364.294557][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:06 executing program 1: 04:55:07 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf84) 04:55:07 executing program 1: 04:55:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:07 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) 04:55:07 executing program 1: [ 364.907632][ T26] audit: type=1800 audit(1561870507.452:41): pid=19356 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17792 res=0 [ 364.984559][ T26] audit: type=1804 audit(1561870507.522:42): pid=19356 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/558/file0" dev="sda1" ino=17792 res=1 04:55:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x983a0000) 04:55:07 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:07 executing program 1: 04:55:07 executing program 1: 04:55:07 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 365.239794][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf99) 04:55:08 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:08 executing program 1: 04:55:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:08 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r3, 0x0, 0x10000) [ 365.911538][ T26] audit: type=1800 audit(1561870508.462:43): pid=19398 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17808 res=0 [ 365.935084][ T26] audit: type=1804 audit(1561870508.482:44): pid=19398 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/559/file0" dev="sda1" ino=17808 res=1 04:55:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xb1040000) 04:55:08 executing program 1: 04:55:08 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:08 executing program 1: 04:55:08 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 366.167372][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xf9e) 04:55:09 executing program 1: 04:55:09 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:09 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r3, 0x0, 0x10000) 04:55:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xc0450000) 04:55:09 executing program 1: 04:55:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:09 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:09 executing program 1: 04:55:09 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:09 executing program 1: [ 367.145452][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfa7) 04:55:10 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:10 executing program 1: 04:55:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xdc7f0000) 04:55:10 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r3, 0x0, 0x10000) 04:55:10 executing program 1: 04:55:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:10 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:10 executing program 1: 04:55:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 368.007280][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 368.007290][ T26] audit: type=1800 audit(1561870510.552:47): pid=19503 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17838 res=0 [ 368.041069][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:10 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 368.121820][ T26] audit: type=1804 audit(1561870510.632:48): pid=19503 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/561/file0" dev="sda1" ino=17838 res=1 04:55:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfad) 04:55:11 executing program 1: 04:55:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:11 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xe0220000) 04:55:11 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) 04:55:11 executing program 1: 04:55:11 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00 \x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 368.897431][ T26] audit: type=1800 audit(1561870511.442:49): pid=19537 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17838 res=0 04:55:11 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:11 executing program 1: [ 368.947681][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 368.999910][ T26] audit: type=1804 audit(1561870511.492:50): pid=19537 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/562/file0" dev="sda1" ino=17838 res=1 04:55:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfaf) 04:55:12 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) 04:55:12 executing program 1: 04:55:12 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 369.690065][ T26] audit: type=1800 audit(1561870512.232:51): pid=19566 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17855 res=0 04:55:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xe8030000) 04:55:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:12 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:12 executing program 1: [ 369.723960][ T26] audit: type=1804 audit(1561870512.262:52): pid=19566 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/563/file0" dev="sda1" ino=17855 res=1 04:55:12 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x10000) 04:55:12 executing program 1: 04:55:12 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 369.902590][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 370.067145][ T26] audit: type=1800 audit(1561870512.612:53): pid=19598 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17816 res=0 [ 370.100936][ T26] audit: type=1804 audit(1561870512.612:54): pid=19598 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/564/file0" dev="sda1" ino=17816 res=1 04:55:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfbc) 04:55:13 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:13 executing program 1: 04:55:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xf4010000) 04:55:13 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) 04:55:13 executing program 1: 04:55:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:13 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:13 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:13 executing program 1: [ 370.801321][ T26] audit: type=1800 audit(1561870513.352:55): pid=19624 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17870 res=0 04:55:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 370.862309][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:14 executing program 1: 04:55:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfbe) 04:55:14 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:14 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) [ 371.586283][ T26] audit: type=1800 audit(1561870514.132:56): pid=19650 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17867 res=0 04:55:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xff000000) 04:55:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:14 executing program 1: 04:55:14 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:14 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') preadv(r2, &(0x7f00000017c0), 0x199, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) 04:55:14 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:14 executing program 1: 04:55:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 371.823208][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:14 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscreate\x00') r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:14 executing program 1: 04:55:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfc0) 04:55:15 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:15 executing program 1: 04:55:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:15 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xffffff8d) 04:55:15 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:15 executing program 1: 04:55:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:15 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 372.702087][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:15 executing program 1: 04:55:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfc2) 04:55:15 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:15 executing program 1: 04:55:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:15 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 373.461311][ T26] kauditd_printk_skb: 5 callbacks suppressed [ 373.461321][ T26] audit: type=1800 audit(1561870516.012:62): pid=19742 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17900 res=0 [ 373.520641][ T26] audit: type=1804 audit(1561870516.062:63): pid=19742 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/570/file0" dev="sda1" ino=17900 res=1 04:55:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x2000000000000) 04:55:16 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 373.747069][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfc4) 04:55:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:16 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:16 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 374.387415][ T26] audit: type=1800 audit(1561870516.932:64): pid=19786 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17901 res=0 [ 374.417589][ T26] audit: type=1804 audit(1561870516.962:65): pid=19786 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/571/file0" dev="sda1" ino=17901 res=1 04:55:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x14050000000000) 04:55:17 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:17 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 374.662091][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:17 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfc7) 04:55:17 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:17 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\n\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:17 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 375.342134][ T26] audit: type=1800 audit(1561870517.892:66): pid=19836 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17901 res=0 [ 375.396918][ T26] audit: type=1804 audit(1561870517.922:67): pid=19836 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/572/file0" dev="sda1" ino=17901 res=1 04:55:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x40000000000000) 04:55:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\v\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\f\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 375.562153][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\r\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:18 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xfd2) 04:55:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x0e\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:18 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:18 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 376.275475][ T26] audit: type=1800 audit(1561870518.822:68): pid=19887 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17908 res=0 [ 376.330088][ T26] audit: type=1804 audit(1561870518.852:69): pid=19887 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/573/file0" dev="sda1" ino=17908 res=1 04:55:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x80000000000000) 04:55:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x10\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x11\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 376.464832][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x12\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:19 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x7ffff000) 04:55:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00%\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:21 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 04:55:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:21 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) 04:55:21 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x100000000000000) 04:55:21 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xffffff1f) [ 379.274283][ T26] audit: type=1800 audit(1561870521.822:70): pid=19945 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17928 res=0 [ 379.291697][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:21 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 379.328348][ T26] audit: type=1804 audit(1561870521.872:71): pid=19945 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/574/file0" dev="sda1" ino=17928 res=1 04:55:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:22 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 04:55:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:22 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) 04:55:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x200000000000000) [ 380.017324][ T26] audit: type=1800 audit(1561870522.562:72): pid=19991 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17918 res=0 [ 380.040330][ T26] audit: type=1804 audit(1561870522.582:73): pid=19991 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/575/file0" dev="sda1" ino=17918 res=1 04:55:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xffff8880a8e56001) 04:55:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:22 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 04:55:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 380.122179][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:23 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000) 04:55:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x300000000000000) [ 380.964285][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xffffffffffffffff) 04:55:23 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:23 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000) 04:55:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:23 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000800, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000) 04:55:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:24 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 381.532013][ T26] audit: type=1800 audit(1561870524.082:74): pid=20087 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16529 res=0 [ 381.557615][ T26] audit: type=1804 audit(1561870524.112:75): pid=20087 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/579/file0" dev="sda1" ino=16529 res=1 04:55:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x400000000000000) [ 381.818749][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='.\xd5\\0\xa8\xfb\x8b\x92\xd7\xfd[\xa0\"=\x80\x9e\xd1\f\xe8\xae\x00\a \xd2A\x064\xfb\xa9\xfb\xa7\xfc9\x1f\xbd\xd8\x06&w\xc9\xa8\x0e0B#\x00\xe6\xaf\xab\xa9\x8e\xfa\nCj\xec\x81\x90\xd1\xf3\x92\xd8y\nP\x17H\xfaeJ\xe6\xc9~\xd1x\xd5\x06\xc8SZ\xab\xf5([\'\x1b;(\x82H\xf2\xe3\\\xf0\x17x\x05\xe4\xaa\x01&On\x8f\xc2%\x87\x0eI\xa2%B\xd2S,\x82\xfb\xf5^\xa4@2\x00\x8d\x949\x8f\xbf\xd7<\x80L,\xe5~\x95\xefdI\xde\xf7\xf6FT\xff\x94<\xab\xea\x15\xd5\xe2U\xca\xdeo\r\xf1P\xe8\xfcv\xc7/9\x95aGth:4\xdcIU!:2&\x8a') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 04:55:26 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\n\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:26 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x700000000000000) 04:55:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_ref\x86\x9e\xf7\x0e\xd5\xda\xa6\x85\x96\xb1\xd8\xa8\xa0\x1a\xcd\x04\xa7.\x9c\x8f?\xf1\x8e_]\xd9F2w\b\xe2kr\xd4\x9d\x81\xc8~\x9c\xa4\xa8\xc1HdT\xba\xe8\x10u\xd6(\xeay\xe8\xbb(*\xf1\xed\xc7\xcf3\xab\xee\x82s\x87y\x9a\x06=#\xcf9B\x93\xe5R\x05\x12D\xc4\x88\xaa\xf0\xe8\xf4\xa7\xbd<\xde\x15\xb3Ea\as]\x1a\xf35b\x91\x192\x18\x7f\xc7\x00,\xe5\xc0\xaa`\x8d\x97\x83\x04\x8agw\x1f\xb4*\xd6\x15\x8bWF\xd5:>\x04\xf9j\xb0\xea\xde a\\\x83!0\xb2\xc5;\xc1\x92\x7f\x9d\x970\x82>j^\x95\xa3\x9e\xbcI\x93\xd6\xca\x89\x0f\x98\xdf\xc9\x14\xa6\xab\x0e\xc1g\xe8\x8d\x92\x8bR\x8f\xc7\xa1\x1d\x9b\x1c\x103?6\xf3\xf3e\x95\xab\xd4\x9dJ\x19\xeb\xc1\xcc\x0fp\xb4\x92#\x96\\\x93\xfc\x91\x10\xfbG\v\xe8\x97%Sa\xbb\xe0\xfd\xd2\x80\xf1\xad\xc9\xfb\xd7\x19RN\x19\x8a)y\x11&}\x97,\xc7\xa9qo\xb4\xcd\x1d\xe7r\xfeq\x02\xe9]u\xbd\xadU9\xdd\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:55:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\v\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 384.172007][ T26] audit: type=1800 audit(1561870526.722:76): pid=20116 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16849 res=0 [ 384.196812][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 384.228584][ T26] audit: type=1804 audit(1561870526.722:77): pid=20116 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/580/file0" dev="sda1" ino=16849 res=1 04:55:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\f\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:27 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\r\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x0e\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:27 executing program 2: r0 = open(0x0, 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x11\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/171, 0x110000, 0x800, 0x1}, 0x18) r2 = getuid() getresuid(&(0x7f0000000940), &(0x7f0000000980)=0x0, &(0x7f00000009c0)) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x9, &(0x7f0000000840)=[{&(0x7f0000000200)="bcdcb0d4754e4564c1d0109824747dc3f1887c2e702822eab8b4201ba12aeff5d8f0068f696493fbbeb9c0455602f851e58071e4b08710ceb2df4c6b47dca4ccc6e81f200c8f39ac0d380eb25e344d05ebe788efd1c5d1dcf7c6500c1ba1002d900adfb2cc5c93d485d193da7ee66798b46077c2700ba0739740db02cafa5556b75061f2", 0x84, 0x3ff}, {&(0x7f00000002c0)="961b83567fed59af7b75526fc3eff28a1f6a1ba9bb7fbe78ce251359ee2b67d9ae9e584666e12422ef816fef83e562f5735c5c7ca5932172f6d008dc71fc4807aca6493bf24f1542f4539cba83bbdd46790e88f377c2c60614df522fe31b9210dc9436b1d5d84ea00d540e5a600b115b9d41d9", 0x73, 0x3}, {&(0x7f0000000340)="b2e7d0821db89783ab21759fe394bf9dfd00b1c04a18b3fa1bbaff5d57d4f6bfd4c361553be9a6d21e916830f71ec8c26d42f030c928c174ccee6749ef80542fd2161734065357527af4b06207db34ba2a9ad407415d4db6bc2d7b5b0f686bcc0effc7ff92a001f40540d5ce685cbc44877b430d72ef312bc89f27be91b6a56d318dca585bc9cb273b1762b1ee8a5400023b97b749da49aca6da9d542798b475e00359a11054e6a38b4b5b80ba7f0b4dc3ab89716ad2384441f702af75faec789108ce4df909a0821ec4653225adc58598aaf90c19583aebdc3d2e57e4c116929db5a64488ecb62da0ab89d355c39825da9a3accb3b7643d", 0xf8, 0x2}, {&(0x7f0000000440)="d74fe573b35a2be5c6bbeba356297daa3269229b9ea0042a96f5ae0ad315a14114d6dbe701f303a112343297ef9d53d15ac4804781e0e722e0dfc7a673dc04b7bbe745760379e9c60b27d3e2d445", 0x4e, 0x3d27}, {&(0x7f00000004c0)="0e57a585d75621987bfaab6d2bb5db10a745a9a9cb388b5684c320e3a1bd90f7ccf5466437ccf0b802413c896474e7831149100c6e18c7732011d935a0376e97ed243782bd7ec3000e3a4949167d284e978d628c26ed69906ca75365bdb1541334952a0e4c1613dfd3953e63ef5039d0f9a26ec520809a5f10d1e4d117f45ef7396e255803222598a53040a87faf73be425b2b88076037690161a598cea757d1d65b2a484b24e9ab7ec9c5a2a66156bd84b6f8d2c948c1bdc6d3cbd6a8ce874243617ec5c81f4eb30edb1ee4a54dab74d1e8fd201509f4ddcf5997", 0xdb, 0x52}, {&(0x7f00000005c0)="f6b1322489a89bd992bc7c5891b49ff413ea58c6154851875f162ba088006533b6ce1354ce98ef4123371bb6fd84f7891996f31f992dbbf585dfaff6cba6a2017ec1f75f19e6185ccc4790ae8835253d82008e5efaf37105b126e8b37279", 0x5e}, {&(0x7f0000000640)="e088f78ae98c9d863e5ef238ee9be3418ba76334e57c12e872f591b9779034a7e606bfa559530964926a095a9a5a17a3b153217c02702160007bc5eecbecda2a3f9be31c9a", 0x45, 0x401}, {&(0x7f00000006c0)="3ce88a83c95b1a98e0b05320bbd5176c5a02b5ecb54be21d32dce4c75671ac57083a3075dea698b486666dcdb6c153c69420c5df4950a606a894a4738ea5e65e08e7373ce03887b10040e2e12c9b9193759e1fb1ff9ab3d48f7f4b218ed70dbec4754f91f6facc6f405cf83462c1a8ab89fcabb244dce68b2c568eb161007d7669368f464ecd116408570d2a5aabcafa802eaef926f2e42962963f54501bbce06067f844ee286f762fa902423abb76a371f6eaee78320f87544ed71c2ea91006ada3e47892d2984031235d957f8bb4e946506d41", 0xd4, 0xc3}, {&(0x7f00000007c0)="e73e3bb11748a396b6724f996d9b5f5bc25ddc97a007253aa48e4b802dcf1942390fddc610ca77097a09be461edd92a65831611e86ff08ab18f3a8fb6cd6408a4c42bebfc0c06641c87f77474028fbdb364541966c2a81afaf9f3b234b86ee6815d224aa6637ba3e408a142c0097c798264a179eb067e7b09e7be3dc88474218", 0x80, 0xffffffff}], 0x10004, &(0x7f0000000a00)={[{@nodiscard='nodiscard'}], [{@fowner_gt={'fowner>', r2}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@obj_user={'obj_user', 0x3d, 'posix_acl_access'}}, {@obj_role={'obj_role', 0x3d, '('}}, {@fowner_gt={'fowner>', r3}}]}) sendfile(r0, r1, 0x0, 0x1) 04:55:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:27 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xa00000000000000) 04:55:27 executing program 2: r0 = open(0x0, 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x12\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 385.039059][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:27 executing program 2: r0 = open(0x0, 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00%\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 385.190788][T20190] jfs: Unrecognized mount option "fowner>00000000000000000000" or missing value 04:55:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:27 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000000)) 04:55:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:28 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:28 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xf00000000000000) [ 385.955470][T20220] jfs: Unrecognized mount option "fowner>00000000000000000000" or missing value 04:55:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 386.012477][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:28 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:28 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 386.329901][ T26] audit: type=1800 audit(1561870528.882:78): pid=20259 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17073 res=0 [ 386.415731][ T26] audit: type=1804 audit(1561870528.882:79): pid=20259 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/587/file0" dev="sda1" ino=17073 res=1 04:55:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='sched\x00') exit(0x0) write$P9_RXATTRCREATE(r3, &(0x7f0000000000)={0x7, 0x21, 0x1}, 0x7) sendfile(r0, r3, 0x0, 0x1) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000040)={0x8001, 0x5, 0xa, 0x4}) 04:55:29 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:29 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1100000000000000) 04:55:29 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) 04:55:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 386.954880][ T26] audit: type=1800 audit(1561870529.502:80): pid=20279 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16977 res=0 04:55:29 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 387.021993][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 387.023376][ T26] audit: type=1804 audit(1561870529.512:81): pid=20279 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/588/file0" dev="sda1" ino=16977 res=1 04:55:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:29 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:29 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:30 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x9, @rand_addr="daab325676915ce447bf4cfdb11fc09c", 0x9910}}, [0xc6c, 0x8, 0x7, 0x7, 0x3, 0x3, 0x7, 0x2, 0xfe, 0x2, 0xff, 0x3, 0x6, 0x3, 0xfff]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r2, 0x59, 0x20}, 0xc) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:55:30 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:30 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:30 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) 04:55:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x1600000000000000) 04:55:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:30 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 387.907158][ T26] audit: type=1800 audit(1561870530.452:82): pid=20326 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17249 res=0 [ 387.931109][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 387.984190][ T26] audit: type=1804 audit(1561870530.502:83): pid=20326 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/589/file0" dev="sda1" ino=17249 res=1 04:55:30 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:30 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:31 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x160, r2, 0x201, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xcedb}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x44f}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x36e9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x800}, 0x40) sendfile(r0, r1, 0x0, 0x1) 04:55:31 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:31 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 04:55:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:31 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x2a525e0c00000000) [ 388.883549][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 388.912258][ T26] audit: type=1800 audit(1561870531.462:84): pid=20377 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17410 res=0 04:55:31 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 388.945890][ T26] audit: type=1804 audit(1561870531.492:85): pid=20377 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/590/file0" dev="sda1" ino=17410 res=1 04:55:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:31 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:31 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:31 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 04:55:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/mcfilter\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00\xa2v\'_\x8d\xe6\x13(\xbf\xb2\x04\x9f\xc4O\x1a/\xbdc\'\xd7\x89\xa0\x10\x01\xe1[\x02\xcf\x1bw\x01\xea\x88n@M7f\xc2b\xa5\xfd\x04\xfe5\xc3<\x9c\x86\x02\x13\x19q\xc7\xd1\x92\x0ee\xb4+)$P\'\x9c:\xa4\xe3\x1a,b\xf4[[\xcdm\xb4\x1c\xd9`\xb2#\xb4td\xb5j\xf2\a\x98\xa2\x9b\x7fb!w') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:55:32 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:32 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 04:55:32 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x3075000000000000) 04:55:32 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 389.807473][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 389.822152][ T26] audit: type=1800 audit(1561870532.372:86): pid=20425 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17409 res=0 04:55:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 389.906080][ T26] audit: type=1804 audit(1561870532.402:87): pid=20425 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/591/file0" dev="sda1" ino=17409 res=1 04:55:32 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:32 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:32 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:33 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x100, 0x2aa600) write$P9_RXATTRCREATE(r0, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000040)) exit(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) 04:55:33 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:33 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:33 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x3f00000000000000) 04:55:33 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 390.806304][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:33 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00 \x00\x00\x10\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:33 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:34 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x8}}, 0x18) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x7fff) sendfile(0xffffffffffffffff, r1, 0x0, 0x1) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x20) 04:55:34 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:34 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:34 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x4000000000000000) 04:55:34 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x10\x00\x00 \x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 391.742127][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 391.742137][ T26] audit: type=1800 audit(1561870534.292:90): pid=20515 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17809 res=0 [ 391.771325][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 391.840323][ T26] audit: type=1804 audit(1561870534.342:91): pid=20515 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/593/file0" dev="sda1" ino=17809 res=1 04:55:34 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00%\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:34 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) exit(0x87e5) sendfile(r0, r1, 0x0, 0x1) 04:55:35 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:35 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:35 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x4102000000000000) 04:55:35 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 392.674452][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 392.696515][ T26] audit: type=1800 audit(1561870535.242:92): pid=20567 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17948 res=0 04:55:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 392.759126][ T26] audit: type=1804 audit(1561870535.252:93): pid=20567 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/594/file0" dev="sda1" ino=17948 res=1 04:55:35 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:35 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:35 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) ioctl$SIOCRSACCEPT(r1, 0x89e3) 04:55:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:36 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:36 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:36 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x4c1d000000000000) 04:55:36 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(r0, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:36 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 393.616271][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 393.633935][ T26] audit: type=1800 audit(1561870536.172:94): pid=20616 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17959 res=0 04:55:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 393.705759][ T26] audit: type=1804 audit(1561870536.172:95): pid=20616 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/595/file0" dev="sda1" ino=17959 res=1 04:55:36 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:36 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:36 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='\x12\xb8\x9b\x80\xf6\x04\x1d;\x91\x80p\xfc$\xd4Qat\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 04:55:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:37 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:37 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:37 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x803e000000000000) [ 394.537937][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:37 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:37 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 394.572120][ T26] audit: type=1800 audit(1561870537.112:96): pid=20664 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17977 res=0 [ 394.600810][ T26] audit: type=1804 audit(1561870537.142:97): pid=20664 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/596/file0" dev="sda1" ino=17977 res=1 04:55:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:37 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:37 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@null, @bcast, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x12, r1, 0x10000000) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) 04:55:38 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:38 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:38 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x808b000000000000) 04:55:38 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 395.495204][ T26] audit: type=1800 audit(1561870538.042:98): pid=20705 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17993 res=0 [ 395.507127][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:38 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 395.562527][ T26] audit: type=1804 audit(1561870538.092:99): pid=20705 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/597/file0" dev="sda1" ino=17993 res=1 04:55:38 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:38 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000000)={0xffa, 0x1, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:55:38 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:38 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:38 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x8dffffff00000000) 04:55:39 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) [ 396.463973][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:39 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:39 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:39 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:39 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f00000004c0)) sendmmsg$sock(r0, &(0x7f0000004880)=[{{&(0x7f0000000040)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0xfffffffffffffff7, @remote, 0x40}}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)="ef313a6c4ab5f93e400bba5816ee37da1806673bb880f7c6bac2be9f96fb323e0a0ad96d536c5f0ffce3ec87d3188f1d5a92638580debe4f6fe0025e67e92f78863c5b3c95b16d09e812f4fe95c3c16846ee8bfeee2ea219cf5f45f5d4b19bc65819d758bc82bcedd42f8a145121b47cf90374cf75ff065ad241", 0x7a}, {&(0x7f00000001c0)="07204bf7ca7355eeeee2d6d1e6566b8155178a4cc28d0787bec22f95b23e8c1f32cc2e811d6e52e6afa1ad6c5dda4e00697e65df305b3d04cb975f7b87a70e45398d7d3d121e6b3f687d7fcd43d476617f4a489d2157b569abc430591b20cffbb6e6663afd36f7d83e183893c70afd67f7ef1c24e37a80dfa4f08f06bce1cd7d1484a12050c6d7fc5f84531c8255532716a7e2697184d3909c0f58388ff18108dc1496184c83872886c65480343c5febbfd7864985188c0760a63cf1fb07ebfb938fbd621a59fdb6207bc5b9e692a22fd4310f63b34f531319925edd1f2b998797569e9707", 0xe5}], 0x2, &(0x7f0000000300)=[@timestamping={{0x14, 0x1, 0x25, 0x221}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x401}}, @timestamping={{0x14, 0x1, 0x25, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0x7d}}], 0x78}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="f7f208360071cf3abb25eb61edcaf540aa48ddfca0d040dcfec016223abcf4834e633e5a8fed5d47745c5797617a9a67c71eec54fdb2c22c9a1256f587cf024a44c8d34e08ae51e9485b50bc94b1c9230f36bf61e24428ea9b0ce79fcbbe0f76223570a8b4d5c17014a470ea38772cad4b0d2bba74c2d5a240d63efbff1cea", 0x7f}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffeff}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x100000000}}], 0x60}}, {{&(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @broadcast}, 0x4, 0x3, 0x4, 0x3}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000580)="9e1f99080c57d36997784188bf726fa5ff43a9875d4be5c46e36039c4950e6557663a53aedf0f21587969e55712830db3e04ce6d107958c34d76a03c094206334e", 0x41}, {&(0x7f0000000600)="ded823ce19eaf6b18b5d8698d4dbebcf7259ac5d060bf7ec57badb673b971611aa4a1ca4e66ce8822f1660ca92bccafdb81dffdc44d2da8ff04d410f3b283cf69127ba2fb2bc3de9c9546fd1c4c6e9a10657804e4a73bffd8b3ef73fa4c28f63766fdc717ebfeba2f5918d7b6869bf405a351ec77d4d4039aa670162a806e612f48a7381c8cb7b9e90093930f0584f589e76cb58cc8008e225d9a6aba24b2cdcbc5fb17c7175713e4da43519dcf8111bd335", 0xb2}, {&(0x7f00000006c0)="a1bf673b34d3328c6c2c9d86f2ac909e2a298bf900b892c571b036186590625b19801d9c558abc29866c304db2cc1a00ce22c374d0996b6e036b05e02ae1ed1c739231e42e8b4b353bbbeee8d6323e56f0a6746e19a6ba83a157e5443cb642f9b3718e0729f48e89db4170fa740943caa72309c8", 0x74}, {&(0x7f0000000740)="b80825f708dbe52b6f234ef45978f1e018220ef3e69c68171496aca50fe7404a463b990c314c4da690a086332a739c4dce64972a7e041796718530b380d9a2359933b0ecabeacb3308df398509bcaf7ad0661b816cf44874bd051d4383ef30d4b0b1b437fc3de6c33e5d7d45c29f3ff891d39c78433982b3f7973f1858470e16545620ee4cd0032267a9ec9deb98b161d350bbe7be130bb1c874bea92a8cbf6ed937e33842c5e602aabd71e92707995b79734bf7a95511406f8758f3894ac2de10c729934d02194323472caad5a932119d", 0xd1}, {&(0x7f0000000840)="71f1bcb5306f2a25e5c7f5207b723e5a", 0x10}], 0x5, &(0x7f0000000900)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0xc1b}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}], 0xa8}}, {{&(0x7f00000009c0)=@ipx={0x4, 0x7, 0x0, "895430e5e78f", 0x7fffffff}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000000a40)="1b8f8e12ed78e4541a669086511190b00b7129ba33", 0x15}, {&(0x7f0000000a80)="621ea26872876d5c41ddcdaf455a36c78fb29ff162699c698742369b64d49e6cd08c4698950d91c5fe6c", 0x2a}, {&(0x7f0000000ac0)="465eb66c99807c464799317104bf7b75a3cfc387cd26b795cb564f87b2d9e3ba975e284281e1524be22f79141aca9290151cdddb89fe09ad68112bee6775bf49d7c2b547aece265b01f261378ab3c8ccea6d74adddc1776a7dcd2ff664293da3e6f3fe7f8ab99585794e0bc20e09ae00b946e4bf3156efd6665ab8fa828ca810c54c2b86bd3469573bc47b2120b58b54c3c9cc7a01673b58d7868b33f87a3f62af5188fb39479c", 0xa7}, {&(0x7f0000000b80)="f31a65d0a064233cc8e80ddf543f5ceea8d4896ca0d677f59e7db7a6342841ce8dd09f30e6f732b49a97141a0115593b853f944c6a2b2e7e8d6e2cc5c5", 0x3d}, {&(0x7f0000000bc0)="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", 0x1000}, {&(0x7f0000001bc0)}, {&(0x7f0000001c00)="99793619845b1488deee169ad118c135b8a51761e4eb4867b4b313be5e841c4d0f3ede1627d543229fadcc2fc6f5a042468926f6758ba0a34000b4e0e6d6df724e6dda4d2d26fd3f1b304f1a25bd01cb0ac5dbcbc8997f01d70a3617d3a8f5cb091c7e66c86389f138dd430905e71226d3a90e1b2a8f0b3b9067a229f75fb0a53413e4f18018044e230693730d67eb60292ca7671448489f2361c3acd20cd98be0f08218be4b49215351a7eecd0719e8d44d46fbfb437edac8ad1e1590bec76bb88a6277ddbf7a5a40fb24ad1886f33e50270b8b6a86562c71ef8511a136ab94f79f3e1fadd743361b8b63498055f4855116fb", 0xf3}, {&(0x7f0000001d00)="2ef7baeff57b61f740c10e0cbeaefbd275e18b14ea78c66e0030620e8c6fe87ef7ed855c1458a4d56425f60963c00296a0181ae3bf10a6515f4c180f452c8412d6eca33a216c0e096f3217497f96ac367b10", 0x52}, {&(0x7f0000001d80)="445b7ac0d193bfe1feadc0c19eb357c2f8cbc938be93bbfa915d9acc8df81ead47905aa06572054e6c6e11b916a713b74ccf52c77e9ff27d3cedd5b016ac764fdf2ab0ecef5c1415dbeff86db5ccda5b9be2f78a1451", 0x56}, {&(0x7f0000001e00)="082c1d8746718ed04f1c70c1f596378f3a85e80bf0a416c604818b41042c5bbbc796407c4b75209959475ff95dd872a384e5d9291087bbcfa2dd13a1d0559aa77959", 0x42}], 0xa, &(0x7f0000001f40)=[@timestamping={{0x14, 0x1, 0x25, 0x1106}}], 0x18}}, {{&(0x7f0000001f80)=@l2={0x1f, 0x6, {0x4, 0x5d, 0x800, 0x1000, 0x72c3, 0x6}, 0x3f, 0x2}, 0x80, &(0x7f0000003280)=[{&(0x7f0000002000)='&.', 0x2}, {&(0x7f0000002040)="406e1bbd147a5e1dde839cbcd44337b9da0ed58946504a8fbebffbd1a6ece6c3b2d6bb6faa96612970836b746638726e5a4ac9d8665ac148a08dc9f194108dfff164aa1cde7da60281400cdc0bcbaca7afa4511b7541b23359c374437e4170950e08c5e8f3c78d78f016605736b60a223b5d37614302ec3888e61cf48059e3c295da2d5c61dc882ef4927d88617944e779de73fdfff3c377", 0x98}, {&(0x7f0000002100)="ae1bad16a85eeb1248864ad2d2d0e4ed9e17f80aed940c41caf2bb8833fc30a3fac9368d3d3ccd78bdaef0c2f867fcef3db43b55", 0x34}, {&(0x7f0000002140)="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", 0x1000}, {&(0x7f0000003140)="070b2ff8f444fe387183c51c5c2e4c0216e3c056b820288854957ec892e1e0734f3a370b27a7758b2e98bd2f626857fd981855189486cd061af0", 0x3a}, {&(0x7f0000003180)="38ce037b2e9088019ff217b274bc4cd5dc76230288695cdd69eaa4338cf48e1a8083f75d6e8858db33b8b10420a8cd5b036af4", 0x33}, {&(0x7f00000031c0)="af156b6a1ff8cd811f1ea91cfda62e699ec9e51c04fa7340e92c5f18b212489a8dc80fb92ecfa8eddd3aa8745af70bd0674688b95ea3f12f08efb0b398adee11c8a8ac00fd2913a99f559ced4b5a7e88f484f94d5865e9baaafdce93d0b7360e2964f2033987302cc6f2a5b933f5397749937300925aab5c8576a40b2025f1af6d81d325c0c5c5bd33fc1da13b6725d91fc837a099efb5f5a01acd7eec1277e84d", 0xa1}], 0x7, &(0x7f0000003300)}}, {{&(0x7f0000003340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @empty}}, 0x80, &(0x7f0000004540)=[{&(0x7f00000033c0)="abd99cc3a75a1a0bcb52084bc34b13aa65913cdc44d3c8984f3d51e19bb7d5a1e82fe5805e6f25d7ef8b9a35c8c949388d1753e5c606120aa94c2159765b6b552abd6ba065787ffe4733c27b251674f4267123b2deafb814a0b470e319fa5bcf3e7ab5e8715229fb5f4a0dc257940027a0ada9fa1839bcb1b1399f919f5759735739e973a0e5bc069e088e8ed926a906ce225e620cb341e6a0326d0e0ed8523f87e8d97497962e544f8f696fa93e992c1a74e148f2efbf4fd7161120be2fa548d0cb51cfea4c5e3fd1717205b80da2b2f864bf96e64ab324403cda6e98", 0xdd}, {&(0x7f00000034c0)="7c338efec11572efdc992313a4a444d5cf4664ddd104da0d74156fb86ef99bb0be69b32d79feb20a4d9ba84adbee87efa64f8802d104f36916784952c7e75fdef041fa0787505d1e5c6bdc8ce9a6e7", 0x4f}, {&(0x7f0000003540)="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", 0x1000}], 0x3, 0x0, 0xffffffffffffff97}}, {{&(0x7f0000004580)=@l2={0x1f, 0xc59, {0x100000001, 0x5, 0x3, 0x5, 0x3, 0x9}, 0x72, 0x4}, 0x80, &(0x7f0000004780)=[{&(0x7f0000004600)="557b97833b9c3b8d653b269fc949dee1a6d8442390614c8f5d35fc7fc1c8fb0ee8c6a2ce013e461aae406ad7d30c716a8c6d1882b7a6eb0fa6ce9972a6768e449d0adf4aa88cd8f67baa8d9b518c5412da8f2719a6afb19b965c004bc5a8c85c0dacda782635ec0971a11bc38fd022157e1ec23a64ae30ea626db5d7f7ce6cf3c9af8371e9cf3e5d0e8abaeab9b5a80306c412cc521a4eb1a6690affc5c44dd77b9539660ff3fc79ca29dd79884697bef4", 0xb1}, {&(0x7f00000046c0)="22f6be5934c8c52393976241fecbda1f88abecedc9d2cf66597e8a74d9b52913e8f648d1f91a5618ccae9a9c1b328d6cabe968bf791553c838dfd45aa7684a11e9270e50bc21810a486d263efadb19b5370c0297d796fab1c168c401de20e92d37a4a5c2", 0x64}, {&(0x7f0000004740)="5795e14768462a138d81cecb2ddbed320534440ee614d76b505a96a7237e2986b38f1764f7c7468401e894c36a83de97252848ac0b44", 0x36}], 0x3, &(0x7f00000047c0)=[@timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x20}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x3ff}}], 0x90}}], 0x7, 0x4800) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000003300)={0x2, &(0x7f0000001bc0)=[{0x7f, 0x2, 0x1, 0x1}, {0x41, 0xdb, 0x2, 0x80}]}, 0x10) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000004b40)={r2, r1, 0x4, 0xf0, &(0x7f0000004a40)="3bbf3fbffccff15c7832457b3ee957e0ff02e1630c4c08a764e480a0873df5bdc59de507ff19ce13bf0e02e80c2d2cbf6cd929cb0e1711c6fcff11cda589cdf8887157e757d43ce32b335976af423ff0a82b068fa61096bbe68fed4a8dedd6ed9570546a2b1b02c6cc2dbe965966583c34b16bed0f5626d2389a4bc4b50c7a4280aaac6fc8f90287dc53fdcbfc4e42cbc4a1c949d3e7821d38512dd2dceee44f571effe1c1b6492e70594932fbfe0d44cb0d167c9fbd0ce1c159e93fd6a4d74dd0633167f440b7d27fc6690ad4bc4775df0b9216417017e58f161af62c31d2fed817780d44b35c025e344b617ec41405", 0x7f, 0x8, 0x9, 0x10001, 0xc7, 0x0, 0x7, 'syz1\x00'}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000004c00)=@assoc_value={0x0, 0x7}, &(0x7f0000004c40)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000004c80)={r5, 0xe, "86152331f9a66561f485906dc12d"}, &(0x7f0000004cc0)=0x16) sendfile(r3, r4, 0x0, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000004d40)={0x6, {{0x2, 0x4e22, @multicast2}}}, 0x88) keyctl$join(0x1, &(0x7f0000004d00)={'syz', 0x1}) 04:55:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x983a000000000000) 04:55:39 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:39 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:39 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 397.399059][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 397.414018][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 397.414027][ T26] audit: type=1800 audit(1561870539.962:102): pid=20811 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18007 res=0 04:55:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:40 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 397.482221][ T26] audit: type=1804 audit(1561870540.002:103): pid=20811 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/599/file0" dev="sda1" ino=18007 res=1 04:55:40 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:40 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:40 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) exit(0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) sendfile(r0, r1, 0x0, 0x1) 04:55:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:40 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:40 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xb104000000000000) 04:55:40 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 398.312041][ T26] audit: type=1800 audit(1561870540.862:104): pid=20851 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18004 res=0 [ 398.337665][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 398.404693][ T26] audit: type=1804 audit(1561870540.892:105): pid=20851 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/600/file0" dev="sda1" ino=18004 res=1 04:55:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:43 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:43 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xc045000000000000) 04:55:43 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) [ 400.533168][ T26] audit: type=1800 audit(1561870543.082:106): pid=20882 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18024 res=0 [ 400.554979][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:43 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 400.573254][ T26] audit: type=1804 audit(1561870543.082:107): pid=20882 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/601/file0" dev="sda1" ino=18024 res=1 04:55:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:43 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:43 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:43 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xdc7f000000000000) 04:55:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x5000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000200)="75eb5bf53f4c544849a2f7ea44acec4b6e6a9e74ec5dbed15109c6b90d6ddc742a07a8d02d977ace9091ab3986afbfc047e6eb656e58c25cb0374f96df9433829f062fb4d8fc16c67b19986ba9b2854acad74c3a24ced5e7cad0ca5ca23d91c31dc8a36aae5203665b94afa6ab0c6c8a74c6ee1fc1a8375906", 0x79, r0}, 0x68) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x8, 0x3f, 0x81, 0x1, r0, 0x3fc0, [], r1, r0, 0x4, 0x1}, 0x3c) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') fsetxattr(r2, &(0x7f0000000500)=@known='trusted.overlay.origin\x00', &(0x7f0000000540)='\xbc\x00\xc3\xacO`7\xbc\xeb\n\a\x04\"]\x7ftf>\xfc\xb7i\xac\x19\xf1\xe2\x10\x7f\xf8\xd6\tT\xac\xc0\tNCn\x8e\xc1\xd9\xcd\xa6\x99\x1eK8\xf7jg4\xeaB\x7f\x890=#\xea\xb9\x10\xae#\xd4ch\xaap\x8d04\x17@', 0xffffffffffffff88, 0xfffffffffffffffe) exit(0x2) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000040)="6cc65c744f7a1ef5076784c20c5daf1601468ade30cbef1e88d386d40bd884ef8f4e773507f26bd4db0e1de9338856279b848e5f07aec7a56428262452ba5b3a16613b5c2824030232e990aec9f3c215a8092c892665a84d0d99827913c52413d1698f53e70a08f025134d02fdbb77e194456c829519c4ea70ad0356ca7f3ae4b0aeaf8c08abddbb27f7133d1e105fe874f65e42d6c77e5ff26e974e", 0x9c) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x80000000, 0x0, 0x2, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000001c0)={r4, 0x7fffffff}) sendfile(r0, r3, 0x0, 0x1) 04:55:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:43 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:43 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 401.412008][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 401.446201][ T26] audit: type=1800 audit(1561870543.992:108): pid=20945 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18026 res=0 04:55:44 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 401.516981][ T26] audit: type=1804 audit(1561870544.052:109): pid=20945 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/602/file0" dev="sda1" ino=18026 res=1 04:55:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:44 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xe022000000000000) [ 402.204217][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:44 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0xfffffffffffff801, 0x100}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:55:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:44 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:44 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 402.313775][ T26] audit: type=1800 audit(1561870544.862:110): pid=20991 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18016 res=0 04:55:44 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 402.352053][ T26] audit: type=1804 audit(1561870544.892:111): pid=20991 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/603/file0" dev="sda1" ino=18016 res=1 04:55:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:45 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xe803000000000000) [ 403.046762][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x4) sendfile(r0, r1, 0x0, 0x1) 04:55:45 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:45 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 403.396307][ T26] audit: type=1800 audit(1561870545.942:112): pid=21040 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18042 res=0 04:55:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 403.458880][ T26] audit: type=1804 audit(1561870545.972:113): pid=21040 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/604/file0" dev="sda1" ino=18042 res=1 04:55:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 403.712004][T21068] cgroup: fork rejected by pids controller in /syz1 04:55:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xf401000000000000) [ 403.900876][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:46 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) r2 = getpgrp(0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x10001, 0x7fff, 0xc00}, 0xc) write$P9_RGETLOCK(r0, &(0x7f0000000000)={0x2c, 0x37, 0x1, {0x2, 0x5, 0x4, r2, 0xe, 'keyringppp1{lo'}}, 0x2c) 04:55:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:46 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:46 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 404.330582][ T26] audit: type=1800 audit(1561870546.882:114): pid=21091 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18046 res=0 04:55:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 404.385113][ T26] audit: type=1804 audit(1561870546.912:115): pid=21091 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/605/file0" dev="sda1" ino=18046 res=1 04:55:47 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xff00000000000000) 04:55:47 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 404.849045][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:47 executing program 0: getpid() r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x673, 0x501) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0xb0, @ipv4={[], [], @remote}, 0x6}, 0x1c) r2 = syz_open_procfs(r0, &(0x7f00000000c0)='clear\xf0z}fs\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r2, r3, 0x0, 0x1) 04:55:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:47 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:47 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 405.264433][ T26] audit: type=1800 audit(1561870547.812:116): pid=21142 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18016 res=0 04:55:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 405.323594][ T26] audit: type=1804 audit(1561870547.812:117): pid=21142 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/606/file0" dev="sda1" ino=18016 res=1 04:55:47 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xffffffff00000000) 04:55:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:48 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 405.750427][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:48 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='\x00'/17) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) 04:55:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:48 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:48 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 406.268814][ T26] audit: type=1800 audit(1561870548.812:118): pid=21192 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18046 res=0 04:55:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:48 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 406.336270][ T26] audit: type=1804 audit(1561870548.862:119): pid=21192 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/607/file0" dev="sda1" ino=18046 res=1 04:55:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0xffffffffffffffff) 04:55:49 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 406.668060][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x5) sendfile(r0, r1, 0x0, 0x1) 04:55:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:49 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:49 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 407.224431][ T26] audit: type=1800 audit(1561870549.772:120): pid=21235 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18052 res=0 04:55:49 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\n\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:49 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 407.459129][ T26] audit: type=1800 audit(1561870550.002:121): pid=21257 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18062 res=0 04:55:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$sndctrl(&(0x7f0000001500)='/dev/snd/controlC#\x00', 0x81, 0x40) r3 = open(&(0x7f0000001580)='./file0\x00', 0x2200, 0x9) r4 = syz_genetlink_get_family_id$team(&(0x7f0000001600)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001640)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001680)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001700)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001ec0)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000002280)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000022c0)={0x0, @broadcast}, &(0x7f0000002300)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000005ac0)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000005bc0)=0xe8) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000005c00)={'veth1_to_bridge\x00', @ifru_addrs=@xdp={0x2c, 0x5, 0x0, 0x1}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000005dc0)={'rose0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005e00)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000005e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005e80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005f40)={{{@in=@empty, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000006040)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000006080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000060c0)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000006100)={@mcast2, 0x0}, &(0x7f0000006140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000006180)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000061c0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006200)={{{@in6=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000006300)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14) getsockname$packet(r1, &(0x7f0000009080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000090c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000009100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009140)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000009180)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000009280)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000092c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000009300)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000009480)={@local, @remote, 0x0}, &(0x7f00000094c0)=0xc) getsockname(r1, &(0x7f00000095c0)=@hci={0x1f, 0x0}, &(0x7f0000009640)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000009680)={@multicast2, @dev, 0x0}, &(0x7f00000096c0)=0xc) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f000000a340)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f000000a300)={&(0x7f0000009700)={0xbfc, r4, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x12c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x743918b7}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x1a8, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r17}, {0x12c, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r19}, {0x250, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r21}, {0x1a4, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}]}}, {{0x8, 0x1, r25}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r26}, {0x16c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r27}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x997}}, {0x8, 0x6, r28}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}]}}, {{0x8, 0x1, r29}, {0x13c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x2, 0x2, 0x50fd, 0x2}, {0x7, 0x1, 0x278, 0x3f}, {0x8f16, 0x4, 0xfffffffffffffff9, 0x9}]}}}]}}]}, 0xbfc}, 0x1, 0x0, 0x0, 0x80}, 0x4000) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000001540)={0x9, 0x7, 0x9c4, 0x7, 'syz1\x00', 0x7fff}) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r31 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(r31, 0x11, 0x0, &(0x7f00000014c0)=0x700, 0x4) sendto$inet6(r31, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000002580)={{{@in6=@empty, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000002680)=0xe8) geteuid() syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7, &(0x7f00000024c0)=[{&(0x7f0000000140)="3e76de3ac3a69ee0fceb0b3e32c1695f12af2754cfd63fbefbf6c0832ef0bb1c53d10c89cc2778a58fb5a2ccfade298c9bdb20acea6a596a37edacac64176beb021568c94035ae57c01f9f2a138f3aee6acf308aa6ba1f79d90917a9cf5f3109b64e15c72150b8db1ce76e5cbcbf2cd18575eeaf891c402e7c012682ed8c3172731aaa050744719e6f285627e6bb9d8f2e88dad5c6f66c0b3fc8c824152adefe86d7dd679388b6f21823231a6ea254cc93dda839731d6ef62be0035e11d8a230da2a4da970b67f7d9e342e7f1b0bad814a08b27542d6fc085158d41daf6dacc7af13ba89ed020bf441", 0xe9, 0x2}, {&(0x7f0000000240)="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", 0xff1, 0xa5d}, {&(0x7f0000001240)="59b0dcd2f8fc4731230b3cf390dcb8d53ac163a9018d0a5a5ea9ee6848db00bcb2c7084c4af93bfb8fa5e7393ce457a08920f2bd39d3d36b12a0d231da3b65a2f5affaa93f88a53185efca8be16423f11e364594e01e5665b22775188bc4c7287135137080d378b1201cb4de4f674b34be6694cfbe89d3c9afbf00e4112a72bc0e36b6f7381fe532b1ef6f43a4adbfa054ccfc998361c7d086455cdbac8c5f0b4d50f287d42f1af8af33254555d6b89c679ff49254085b3f5a45595b6e470db62c53f56714cac215", 0xc8, 0x5}, {&(0x7f0000001340)="470cc19dd2eacfc598510834e2620a16f38bc52a88fd000000000000000292a9b8fadabc0c42d788228d19e5cc1e13a61714c093405dcfddac74bab4a0f85746d9a3bd8db679043c7fa14d45b46a4bf0886e25d7fd0e2e3d00f21b805732b385140b2b2c93e5112765d7cac7c231e5352ed7a1ac29b6f12e43cd8771fb83ec2542a2", 0x82, 0x6}, {&(0x7f0000001400)="c9a5c26f33e6c42337f181928b4541d6e3277b6fd90450266970107f2c3421003f9fc585c110cf47ffcbe25def820c12706c3d951bb86440ffac1f6811c18b2fb7e9c8401b086ad0d70cc1db4670e2894333318f7e3b952006d7287489ee5d5bcaf06a8880910c129d0ba99c8c81ce25e9f986a53e897b93da2f5663e3030000006b1af09fc03c8d9ca41f64f2d9c86d3cc75aff455728337ad82a", 0x9b, 0x5}, {&(0x7f00000027c0)="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", 0x1090, 0xa}, {&(0x7f0000000080)="669747f8354d46e370f2b82178cbc7951514cb939cfe704f57f7e624cf3bc8ff1cbd6e83c530b7f2b1e640f65e420a09eab7ebd0e5e9b993a30afaa87e8171f76a713472460e067567dcdac0887c54a68e83ca28664592da33a95a34f6ddb87cc4a5", 0x62, 0x1000}], 0x0, &(0x7f0000001740)={[{@usrjquota={'usrjquota', 0x3d, 'fsname'}}, {@jqfmt_vfsv1='jqfmt=vfsv1'}], [{@obj_role={'obj_role', 0x3d, '{systemcpuset\x93+proccgroup%*'}}, {@subj_type={'subj_type', 0x3d, 'veth1_to_bridge\x00'}}, {@fsname={'fsname', 0x3d, 'nodevbdev'}}]}) 04:55:50 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\v\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) [ 407.648724][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 407.808433][T21280] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x83a4b614) [ 407.817173][T21280] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 407.825607][T21280] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x7e0a3fbc) [ 407.834092][T21280] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 04:55:50 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x301000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x5, "b8253c784f"}, &(0x7f0000000080)=0xd) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x20, 0x204, 0x4, 0x6, r1}, &(0x7f0000000100)=0x10) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) getsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000001c0)=0x6, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r2, r3, 0x0, 0x1) 04:55:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:50 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(0x0, 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:50 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\f\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x3c) 04:55:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:50 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\r\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:50 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000000), 0xfffffffffffffe50) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = dup3(r0, r0, 0x80000) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f0000000000)={0x10000, 0x81, 0x1}) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:55:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:51 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x0e\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 408.604073][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 408.832242][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:55:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:51 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:51 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x10\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000040)={0xb, 0x1, 0x4}) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:55:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 409.165173][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:51 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x11\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 409.211137][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 409.224812][ T26] audit: type=1800 audit(1561870551.762:125): pid=21348 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18072 res=0 04:55:51 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x12\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:52 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00%\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:52 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x8000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000440)={r0}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0xc5, "c56740ce620aca223d1c3ff40adb4c9f55f50d732b4777054ccfb046bfd86aab8f939c7e09d0db2e1d3620b135961308cab19aa4edb290062bee2746ab2a95aa8177edefd2e1aaac4373d46ddae8f4928fd0327c7a960f053422b6c62b0571538212f5a42a5e2f186ef6502404a7e8c9e8195bd3d91f3c794abadb00a30d4cbab72c12c4a778ce5385236044759ae888ae8fdebe5edb7a471acf31fee4c837462155112125e538ce02b142daf2be8684ff6c1b8ae976ee84d65b532f15b6ea2a3f38c2ae3e"}, &(0x7f0000000100)=0xcd) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={r3, @in6={{0xa, 0x4e21, 0x1, @local, 0x10000}}, 0x4d61, 0x6, 0x5, 0x8, 0x10}, &(0x7f0000000380)=0x98) sendmmsg$alg(r1, &(0x7f0000004f80)=[{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000000c0)="591a18bc49b09bcea220cf1bb2027308a1de87b203fa550178559061e46127a6da6e079058", 0x25}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="713e564e848291781cd6720bec806848f4f60c3f0bd069b622af0b6e77efa96eb6dd1fdd814709628567d5868de692cdc3627472fa84d0ccbd8967c8cd0b29e803ead35b2667173ae690caf6fb56c24da7d77c01bcaa38a4f671fbb51c06451702a2a05d96ff7050a8579178c0219c22dc02f95b8d6ad5565af9efb714543cef3a62cd38d959bd7971f7e0e8515dbb0b428517f14b575ad0c1f08e9326f47dfcd34fa18f58a3e8ca48f7f8e13e5d82fcc081ff5ae3a8fed197eebdf3250493b76f2b8d7eec0faecb8711c6450b89788529b0424beda900babed66de4eff81f7e7df9370e2b071719e722cd88d0912157eaed821e", 0xf4}], 0x3, &(0x7f00000015c0)=[@iv={0x38, 0x117, 0x2, 0x24, "9ac622a881a6d1a3ab42a65a183137daff5e8768aaa3ff904710b4cb1719cfa3505494ab"}], 0x38, 0x400c000}, {0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001600)="9308aa6632077e03e4c289bdd4aa4564d6cd8b95e83f2b5468cc26708d20eaa54fe1439a3fe379851aeefabc78e306c59cace6b6982175065fd76ca260008668b5bac7d6b5a10fd9200ceb8134ebb51951893ed70974f41555d16aa0b750b5986b25bcf0c883580b338d4aa6e9a51823698dcea80940f17fbc40d19d25b84eed647fdc37e9ee7fb86011ed7aa4d5566c254859c5764a0016e2652c3f9cf11410ca5d5f44cca03d1725", 0xa9}, {&(0x7f00000016c0)="775e1f76de2aa26a7b61141fadb0522481551b4dd137e3afb9def8979f9d3f1b8f9e613b2b19831da5f0ae3ccb6bb819f5b96426f3ea92cf476989e422cfce9421962c7c3d9f9db13231cbd19b113cd9c66c607c56db5207db6ec276ed530071fea1b16d838cd24efeca6f9272b61f95c4ac8eeee496fec1be98b67f39f9a5d714b1ab9a6e5cd5b4d99532fe07ab671793eaeff34504f5dbaca46080d6c98d8e526b6efe585e297eb4d57e90212a6e70e8097143ffe35601397de7ee9a259d", 0xbf}, {&(0x7f0000001780)="1983a4950dbfda9cde7f734ac73137b39c147a2cda76808542ad2af5e5c70f", 0x1f}], 0x3, &(0x7f0000001800)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x80}, {0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f0000001840)="4d178ec26a36c76fa58d80b8bc87388ba92864064d99a699d81771e208b2b6574670d39935e4ef92526076078014150fe841424e34b6", 0x36}, {&(0x7f0000001880)="503a88688712877f9f99ad16439fa44b91e4c93c4f07b2ac892a86a202fad5e775f4d09b56a6e7dc3805b524c661747db97b9ccbfbb0345050757659cf01137ced7e056ce893cb2a82ffa4e3bd3c80e8823aa00508b95f72b197663cd0646adb5dda512bdcb11310330319ffd545", 0x6e}, {&(0x7f0000001900)="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", 0x1000}, {&(0x7f0000002900)="e5def75f49e0a887c80cf3370a4f83469b0d5477b2d8f94c482566e40ce5f6c32b6eb700d241bae45c0819683431cf8cc5ea17efeaef6fb8e211fcc0ffa8132b4883edbb1009a6546b92782c58d3be73d4288e331d92f99a8a1efc1293399161f19f0f8656ad61f2544f4dac87323b14866b63b095fcf6bd9c4c246368b6d8903cff56", 0x83}, {&(0x7f00000029c0)="0dc38c5dc2c34fac2102596364bbfd71fb3167a303f4b87e4386be75316ad639a46a962f1bce0725c657c7a0a8db8140851ef6505026028e334824bb395eee714d8a5761be0a411aa94f32371b", 0x4d}, {&(0x7f0000002a40)="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", 0x1000}], 0x6, &(0x7f0000003ac0)=[@iv={0xb0, 0x117, 0x2, 0x97, "559ce5ef0b2b31295385ef926454259a76396c8f167dd670d8312060b79fa7ad9011cacd726172ff032953579e92b75e6dc60c791757be0aaa003f58678375aacfeb7c2f0eaeca6807a7b88793d31c22a4df2b0bc9212afabffe93a307f3644da202bafee5ed6f890a05d77a7692dcdbe63e2aa3656a9121558c4f0d61a4a2ada9f9224ef739f74b1722bbee721f781755389be3f40e3c"}, @op={0x18, 0x117, 0x3, 0x1}], 0xc8, 0x4000000}, {0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f0000003bc0)="7a4d523dbd0dd7f14ac235f75fd055082767dc8e2f6e918be3fafb0d86c8da747f6d00f8062b48f63cb9d049bbaa6d8573c30681e71e01c23a00357b5e6a0165178887c6ea07155bd249f6aca77abe1a669ea332656516d1ae5c95ec657bd1a29d88fda55c946265ebb5718aab0102264aefa662054f72b19f0e5bb1898c0df8e0a6ad544a6632dbd05a6157d032f43639a5321e32ae108aa87db4427b814fd90dc8f43591de59698a", 0xa9}, {&(0x7f0000003c80)="819431e505a041a7fa92b78e2a3ed0d931e973b4de", 0x15}], 0x2, &(0x7f0000003d00)=[@assoc={0x18, 0x117, 0x4, 0x7}], 0x18, 0x800}, {0x0, 0x0, &(0x7f0000003d40), 0x0, &(0x7f0000003d80)=[@op={0x18}, @iv={0x80, 0x117, 0x2, 0x69, "83fabaf80634efc6e7cce4833c9d300e5c04a11dad154b0e7b9035cead03db7bfa69ef9c08f370565426e5646d17ce2bf141e663769ecf8d158f60a5b268a38239dd3ed0b165f03bf9e6244aba42645d4a3754bc62723761a8357fce477fb1bc9bbd53283d08f70135"}, @op={0x18}], 0xb0}, {0x0, 0x0, &(0x7f0000004f00)=[{&(0x7f0000003e40)="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", 0x1000}, {&(0x7f0000004e40)="433306ff3fb6c74e4c1a7f52841fedf19c41b39c4b3dd6dd6db952b500cef39f5b0f9e2ab2843cf24f89172d6c753eec095451c04f274a0945db66e0a135f7d11c3a63185104dbab5954016b520d34bd3b7d805e8d58d373eed143d58300aa759749caf40e4f868a848e6610cd88b47abefbf4ec4a7401e2c60c299743cc3f4ddeeae476af27273282e688aafaa7187f86c56da33db6122556f0930a7fc8b3cd05887a434a0239c69340e1fc6908866f6d88945eae95645e8f", 0xb9}], 0x2, &(0x7f0000004f40)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4080}], 0x6, 0x8000) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) r6 = syz_open_procfs(r5, &(0x7f0000000180)='stat\x00') exit(0x7) sendfile(r4, r6, 0x0, 0x1) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000000040)=[r4], 0x1) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0x8001, 0x402) 04:55:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept$inet6(r1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:55:52 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:52 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 410.168577][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 410.200013][ T26] audit: type=1800 audit(1561870552.752:126): pid=21492 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18078 res=0 04:55:52 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 410.255810][ T26] audit: type=1804 audit(1561870552.772:127): pid=21492 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/613/file0" dev="sda1" ino=18078 res=1 04:55:52 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:52 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 410.448928][ T26] audit: type=1800 audit(1561870552.992:128): pid=21611 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18062 res=0 04:55:53 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 410.514544][ T26] audit: type=1804 audit(1561870553.032:129): pid=21611 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/614/file0" dev="sda1" ino=18062 res=1 04:55:53 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000040)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') setsockopt$inet6_dccp_int(r2, 0x21, 0x0, &(0x7f0000000000)=0x749, 0x4) exit(0x0) sendfile(r1, r2, 0x0, 0x1) 04:55:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:53 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:53 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) accept4(r0, 0x0, &(0x7f0000000000), 0x800) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x201, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 411.040591][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 411.075832][ T26] audit: type=1800 audit(1561870553.622:130): pid=21639 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18079 res=0 04:55:53 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 411.129973][ T26] audit: type=1804 audit(1561870553.662:131): pid=21639 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/615/file0" dev="sda1" ino=18079 res=1 04:55:53 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:53 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, 0x0, 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:53 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 411.338001][ T26] audit: type=1800 audit(1561870553.882:132): pid=21758 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18079 res=0 04:55:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 411.386639][ T26] audit: type=1804 audit(1561870553.922:133): pid=21758 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/616/file0" dev="sda1" ino=18079 res=1 04:55:54 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:54 executing program 0: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x121) ioctl(r0, 0x101, &(0x7f00000001c0)="2f2d420196432d6ecfb73a10db87fc6277ec1ebee5ab1d2558ef56b6c9e60f433a8c6a4786feb73bed4d5f211cdf35c57b1cc5e9c0340c4dacbb11db9a0cbf4fc7c8346602a22b7c35451b3a4b09f7e70cfae83aa39e6f9381777e3d050e25bc6326e83979bc73e3e0b38bbb6eae10a9894864450c739f586ec0300f3b7ed7c7f685780dfa9af6787591a5efac20105aebcbfccd7f8ed08f7865d77805c88d6bb55c3987073e473c7101ff16efe5851432734fedad5c82886761edfb9f2a273edd040a1e72c241") open_by_handle_at(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="3b00000071fb83245e55bc1ec7a0d2c5e054b344b8c934e1223ea0f981e39ba529903d6babd9e716b2d606716a711b214d90dde09cc5298f37cf5cac7176519e862a86fd63"], 0x10000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00%\x18\x82\x06\xcf\xa2A\xee\xdeL\xf9\x99\xb2.\xf5qT\'\xf4\xd4\xaf\x0f\xffd\xd2\xdc\xc0\xb5J\x96\x81\x87\x11\xb9k\x87\xc4m\xa0I\x7f\xc7E\xdb\xdf=\x95&\xf3\xc6whP\xea~EU\xd0\xbfu\xcf\x9b[\xda\a\x14(f\xb5V\x11\x8d\x12\x03B\xcf\xea\x19\xdd\xa6\xe6\r:\x00B\xfa\xe7\x7f\xda\x14\x96\xfc\x18\xcc,\x199\x81\xd2\xbd\xa9\xea\xb8ekf^\t\xa287va\xefVI\xef)\x94\xe9\xb2ze\x0f\xe0\xa6\xd6\x8aMj\xb7\xd6\x1e*;\x99\xbc\x17\x88\xa6\xeaj\xb9\x1b/\x1a\x10l\xc5\xb9w\x98+\x10\xfe\x13\xb1\x1a{\x17eO\xd2\xe3<\xa2\xa9+\xb1N\x12|\xc7|\x19\rP\x82w\x93\xcb\x99\xc6\x14\xddC\x1a\x9d\xed\x12\xe8\t\xde\xa9hF\xe3\xf0\xefZ\xcd\xe6S6\xd6s\x19d\x00\x91)L\xaa\x0f\x82\xe4e\xbd`em\xc6si\x11\x7fN\xa1\xcd\xad\x19\xa3\xc1\x1f\xb7n\x97\x82\x89\x14\x13\xab\x1a5\xe5\x8f\xf6<\xf4\x99\xfb\xfb}\xc5H~]\x1ba\xd4\xe1\xe6*%\xc8\xb4\xc6\x12#\r\xfa\x16\xae\x95\xc4\x92\x9fy\x99\xbf\xd8\xf9q\xd8') exit(0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f00000002c0)=0x1) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r1, 0x28, &(0x7f0000000380)}, 0x10) syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x0, 0x2) sendfile(r2, r2, 0x0, 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000480)={0x0, 0x2, 0x200, 0x1}) 04:55:54 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000000)=0x8) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000002980)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000002a00)=""/83, 0x53}, {&(0x7f0000002a80)=""/176, 0xb0}, {&(0x7f0000002b40)=""/170, 0xaa}, {&(0x7f0000002c00)=""/32, 0x20}, {&(0x7f0000002c40)=""/246, 0xf6}, {&(0x7f0000002d40)=""/4096, 0x1000}], 0x6, &(0x7f0000003dc0)=""/143, 0x8f}}, {{&(0x7f0000003e80)=@nfc_llcp, 0x80, &(0x7f0000004180)=[{&(0x7f0000003f00)=""/109, 0x6d}, {&(0x7f0000003f80)=""/28, 0x1c}, {&(0x7f0000003fc0)=""/149, 0x95}, {&(0x7f0000004080)=""/58, 0x3a}, {&(0x7f00000040c0)=""/159, 0x9f}], 0x5, &(0x7f0000004200)=""/4096, 0x1000}, 0x1}, {{&(0x7f0000005200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000057c0)=[{&(0x7f0000005280)=""/57, 0x39}, {&(0x7f00000052c0)=""/221, 0xdd}, {&(0x7f00000053c0)=""/135, 0x87}, {&(0x7f0000005480)=""/233, 0xe9}, {&(0x7f0000005580)=""/70, 0x46}, {&(0x7f0000005600)=""/95, 0x5f}, {&(0x7f0000005680)=""/159, 0x9f}, {&(0x7f0000005740)=""/88, 0x58}], 0x8, &(0x7f0000005840)=""/243, 0xf3}, 0x7fffffff}, {{&(0x7f0000005940)=@un=@abs, 0x80, &(0x7f0000005d00)=[{&(0x7f00000059c0)=""/46, 0x2e}, {&(0x7f0000005a00)=""/131, 0x83}, {&(0x7f0000005ac0)=""/251, 0xfb}, {&(0x7f0000005bc0)=""/143, 0x8f}, {&(0x7f0000005c80)=""/120, 0x78}], 0x5, &(0x7f0000005d80)=""/131, 0x83}, 0xffffffffffffffe0}, {{&(0x7f0000005e40)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000005f80)=[{&(0x7f0000005ec0)=""/85, 0x55}, {&(0x7f0000005f40)=""/17, 0x11}], 0x2}, 0x8000}, {{&(0x7f0000005fc0)=@nl=@unspec, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006040)=""/151, 0x97}, {&(0x7f0000006100)=""/182, 0xb6}], 0x2, &(0x7f0000006200)=""/201, 0xc9}, 0x9}, {{&(0x7f0000006300)=@l2, 0x80, &(0x7f0000007500)=[{&(0x7f0000006380)=""/224, 0xe0}, {&(0x7f0000006480)=""/74, 0x4a}, {&(0x7f0000006500)=""/4096, 0x1000}], 0x3, &(0x7f0000007540)=""/147, 0x93}, 0x3}, {{&(0x7f0000007600)=@nl=@proc, 0x80, &(0x7f0000007780)=[{&(0x7f0000007680)=""/92, 0x5c}, {&(0x7f0000007700)=""/111, 0x6f}], 0x2}, 0x2}], 0x8, 0x20, &(0x7f00000079c0)) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000007a00)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6b, r2}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000040)=""/71) write(r3, &(0x7f0000000140)="2572c4c69df8a41195e542ac55e7dd3a4418ac61d2d04377eeeab0c10b783cab235950fbdea945a12c718664c5dd09cd10f745ebd6d149d447d2b4b4d772d65bfc111ed4178d608408f3aa0baf3fbf3634c6802c213b0acce8b646343d1b6b3e58cc92d71272b719aa215c688db797228dde2d2464e4a968868f5dbd36c53b22c4bdcf89be5b0ab13a57ee3cefb656ea6c2f6008cf8f345344ae05a5226d394cf302affbab62b0e025c79be2b478b604554522ff19bb1b96272ffc5bb19dae", 0x48) fcntl$notify(r3, 0x402, 0x10) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:55:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 412.020071][ T26] audit: type=1800 audit(1561870554.572:134): pid=21783 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16706 res=0 04:55:54 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:54 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 412.175819][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:54 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:54 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600), 0x0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:54 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000040)={0x9, 0x40}) exit(0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0xc0) sendfile(r0, r1, 0x0, 0x1) 04:55:55 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x100) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 412.926288][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:55:55 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\n\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:55 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x100) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:55 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\v\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 413.096778][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:55 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x100) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:55 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\f\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:55 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\r\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:56 executing program 0: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000040)='~L\xac=C\xd4\x94\x9du\xb8Yk\xf4\x81\xa9Sclear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) 04:55:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @local, 0xffffffffffffffff}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000002380)='/dev/null\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000023c0)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000002400)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000002440)=ANY=[@ANYRES32=r3, @ANYBLOB="0300990092b930fcfd1a06d7a3c499c32bcea8ba3be59f0334e6ddfbdc04b2f33b62259481f8582a2652d4ca166ac73db6cd361b53ac3ecb36c4474f589c8ce67e4704187d8d8194c7c58c61e66db89981ac75189011c7c1994c808a391262df76cfa125802600bb8c4b2e068d07fd07e2176304b8d33ca83dfcf001856830f570749c756b933d8e3381c53e3a3e9db5b528"], 0xa1) r4 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r4, 0x40045730, &(0x7f00000012c0)=0x9) ioctl$PIO_CMAP(r4, 0x4b71, &(0x7f0000000140)={0x9, 0x6, 0x5, 0x200, 0xfc, 0xfff}) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000000c0)={r5, 0x8001}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000001300), 0x1) ioctl$VIDIOC_SUBDEV_S_CROP(r4, 0xc038563c, &(0x7f0000001280)={0x0, 0x0, {0x0, 0x2, 0x200, 0x8}}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = add_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="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", 0x1000, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r7) ioctl$sock_bt_bnep_BNEPCONNADD(r6, 0x400442c8, &(0x7f0000001340)={r4, 0x9, 0x1, "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"}) sendto$inet6(r6, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:55:56 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x0e\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:56 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7", 0x180) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:56 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x11\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x0}, {}, {}]}) ioctl$BLKROSET(r3, 0x125d, &(0x7f0000000200)=0x8) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f00000001c0)={r4, 0x5, &(0x7f0000000080)=[0xa380, 0x8, 0x4aab, 0x1, 0x8001], &(0x7f00000000c0)=[0x0, 0x7f], 0x0, 0x2, 0x9, &(0x7f0000000140)=[0x3, 0x2], &(0x7f0000000180)=[0x2, 0x1000, 0x70d9, 0x9, 0x357, 0xffff, 0x8]}) 04:55:56 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7", 0x180) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:56 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x12\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 414.114866][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:57 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x180) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x1) 04:55:57 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00%\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 414.621238][ T26] kauditd_printk_skb: 15 callbacks suppressed [ 414.621247][ T26] audit: type=1800 audit(1561870557.172:150): pid=22321 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16897 res=0 04:55:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:57 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:57 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1c0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 414.682108][ T26] audit: type=1804 audit(1561870557.202:151): pid=22321 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/625/file0" dev="sda1" ino=16897 res=1 [ 414.817878][ T26] audit: type=1800 audit(1561870557.362:152): pid=22418 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17233 res=0 [ 414.869655][ T26] audit: type=1804 audit(1561870557.402:153): pid=22418 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/626/file0" dev="sda1" ino=17233 res=1 04:55:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "2b7df78c73608a3563b3e30a4ebb9a44089abbf6"}, 0x15, 0x2) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000040)=0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r0, &(0x7f0000000380), 0x55f) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0x0, 0x100, 0x0, 0x0) 04:55:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:57 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:57 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1c0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:57 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 415.095665][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 415.107006][ T26] audit: type=1800 audit(1561870557.642:154): pid=22450 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17171 res=0 [ 415.142187][ T26] audit: type=1804 audit(1561870557.662:155): pid=22450 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/627/file0" dev="sda1" ino=17171 res=1 04:55:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x2) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 04:55:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:58 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x148, 0x101000) connect$tipc(r1, &(0x7f0000000040)=@id={0x1e, 0x3, 0x3, {0x4e21, 0x4}}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r1, 0x4, 0x6c00) write(r2, &(0x7f0000000380), 0xfffffffe) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000240)="8a01506faa54cc431d49f961ae3905fd64d34fad7ccf8ba9e74529b71e9435cfa3827705622b762562a2fae7438203b9bc845895567bee35cff9cac6efc07f49c87eec17f7466b5bd3444d992cb57f9a7e67fa1929ca7f1cb800009d76b024ecd46cedddbe0ad017dc2e426185c37eb47fa55470ddf626193c1a4a72cd5028ff47087c68cc6197d04f610a94fba16498b165610e2233c96f2de26aaa580276acde6dae0836f27e10290ee16295b08c30029b17aecd27d7101c77a741f9c11c37c9f7", 0x3dc09466, 0x4000, 0x0, 0xfd84) 04:55:58 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1c0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:58 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 415.571058][ T26] audit: type=1800 audit(1561870558.122:156): pid=22469 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17473 res=0 [ 415.600637][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:58 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1e0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 415.655583][ T26] audit: type=1804 audit(1561870558.152:157): pid=22469 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/628/file0" dev="sda1" ino=17473 res=1 04:55:58 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 415.777848][ T26] audit: type=1800 audit(1561870558.322:158): pid=22579 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17473 res=0 [ 415.828577][ T26] audit: type=1804 audit(1561870558.352:159): pid=22579 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/629/file0" dev="sda1" ino=17473 res=1 04:55:58 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='nt/netfilter\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000500)='/dev/snapshot\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, 0x0}, 0x10) r3 = open(0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="000ffe00008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe20353fda911e947964b15bac00e591b45e8eebf7ffffff1e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb786"], 0x141) getpgid(0x0) fchownat(r2, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x1400) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r5, r5, &(0x7f0000000000), 0x8080fffffffe) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$dupfd(r6, 0x406, r6) ioctl$BLKDISCARD(r5, 0x1277, &(0x7f0000000040)=0x7f) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, 0x0, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:hald_cache_t:s0\x00', 0x22, 0x1) r7 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup3(r7, r6, 0x0) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:55:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:55:58 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:58 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1e0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:58 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0xfffffffffffffc8c) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x2000000007, 0x200000) fcntl$setstatus(r0, 0x4, 0x2000) fchdir(r0) write(r0, &(0x7f0000000380), 0xfffffffe) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000040)=""/104) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea000000d7a6b9a731cfb4ba9c2b2400970472086d8abcf1f45549551ef2deeb4ba911ace86dd84e14cbcb63961141945eedf9627f6bfd49064f7af6e0ddb7e02c82e62cdff17fa6016b23e1c5ed3c4fc93edd1aa8a3df907115ac044ff46dda03860afe8a2a9fd6c28301c2894ac02bdbd698dee832a03d1cd63081feec5d3dc992e4a737969737e0f5a48601b6c98d7682f27ab73b5db928a898bb9647f59fcd6c21a66c0daba382a57f0100fd9aa353dea94262906b0c4e6bfafdc7be8b61cb4d1f9791c2049b1237b15e8f53560ec390d28460a4b7a69dea5d4cf7f0e64a5284065c9454102b306e748ad4eeed7fb81424735641b00d80b543174f51f536711f0cab3ab04fc1d5d6e0bac2eff56b68afe89577041a76ced6cf919645b8775aa8c39e8d4018da27e03168e46442f9fe0540ca3a8e9147da6d70b6ebbe36deed18b2cb3dc9a6b032eb646cca8461d26464a1fdc854ad0556a49f03578ea8d9a6f84e74c303867f9ddda01d65b40d75b411302752d297db562a047d0f3731b7fbdb5b520984c98dbae2094f044cbba3f2e5ce5563feac70649fdd8f2b2a6b2314"], &(0x7f0000000140)=0xf2) getsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f00000003c0)={@remote, @empty}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000180)={r4, 0xf3}, &(0x7f00000001c0)=0x8) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:55:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:59 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:59 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1e0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0xfffffffffffffffe) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:55:59 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 416.775593][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:55:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000280)={0x0, @multicast1, @broadcast}, &(0x7f00000002c0)=0xc) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000300)=r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x2, &(0x7f0000000000)=',\x00', 0xffffffffffffffff}, 0x30) r3 = getpid() r4 = syz_open_procfs(r3, &(0x7f00000000c0)='net/nfsfs\x00') ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f0000000200)) r5 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000400)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000500)=0xe8) r7 = geteuid() r8 = geteuid() mount$9p_xen(&(0x7f0000000340)=',\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x41800, &(0x7f0000000540)={'trans=xen,', {[{@access_user='access=user'}, {@posixacl='posixacl'}, {@access_uid={'access', 0x3d, r5}}, {@loose='loose'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_type={'subj_type', 0x3d, '}'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r6}}, {@uid_gt={'uid>', r7}}, {@smackfsfloor={'smackfsfloor', 0x3d, ',\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise_type='appraise_type=imasig'}, {@euid_gt={'euid>', r8}}]}}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r0, 0xa, 0x3}, 0x14) exit(0x2000000) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000080)={0xfffffffffffffff7, 0x100000001, 0x5, 0x81}, 0x10) sendfile(r0, r4, 0x0, 0x1) creat(&(0x7f0000000100)='./file0\x00', 0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x1c) 04:55:59 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:55:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:55:59 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1", 0x1f0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:55:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:00 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:00 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 417.547568][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x79b, 0x80002) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000080)) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000040)={0x29, 0x4, 0x0, {0x6, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r3 = accept4(r0, 0x0, 0x0, 0x1) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:00 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:00 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f0) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 417.717370][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xcc) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:00 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:00 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a", 0x1f8) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:00 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:01 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a", 0x1f8) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:01 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\b', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:01 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1f8) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 418.653549][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:01 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\t', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:01 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fc) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 419.219288][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 419.225127][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 419.230968][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 419.236711][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:56:01 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\n', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:02 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fc) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffffffffffe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x8) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:02 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:02 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed183", 0x1fc) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:02 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 419.717426][ T26] kauditd_printk_skb: 20 callbacks suppressed [ 419.717436][ T26] audit: type=1800 audit(1561870562.262:180): pid=23176 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17698 res=0 [ 419.780315][ T26] audit: type=1804 audit(1561870562.302:181): pid=23176 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/640/file0" dev="sda1" ino=17698 res=1 04:56:02 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) r1 = getpgid(r0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='clear_refs\x00') setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000240)=0x8, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000080)) sendfile(r2, r3, 0x0, 0x1) connect(r3, &(0x7f0000000000)=@in6={0xa, 0x4e20, 0x964, @remote, 0xffffffffffff8000}, 0x80) 04:56:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:02 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\r', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:02 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fe) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:02 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 420.267978][ T26] audit: type=1800 audit(1561870562.812:182): pid=23195 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17745 res=0 [ 420.331657][ T26] audit: type=1804 audit(1561870562.852:183): pid=23195 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/641/file0" dev="sda1" ino=17745 res=1 04:56:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x60, r2, 0x802, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fffffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x93}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000004}, 0x20000010) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x108, r2, 0x20, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3de2}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x20}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4a}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffa}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xe}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x2a}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x24}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x108}, 0x1, 0x0, 0x0, 0x40080}, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r3, &(0x7f0000000380), 0xfffffffe) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:03 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1fe) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:03 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 420.576127][ T26] audit: type=1800 audit(1561870563.122:184): pid=23319 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17345 res=0 04:56:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 420.632296][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 420.634901][ T26] audit: type=1804 audit(1561870563.152:185): pid=23319 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/642/file0" dev="sda1" ino=17345 res=1 04:56:03 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f0000000080)=""/130, 0x82) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:03 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00 \x00\x00\x10', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:03 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 421.174944][ T26] audit: type=1800 audit(1561870563.722:186): pid=23342 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17713 res=0 04:56:03 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 421.224529][ T26] audit: type=1804 audit(1561870563.752:187): pid=23342 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/643/file0" dev="sda1" ino=17713 res=1 04:56:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_CAPBSET_READ(0x17, 0xe) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:04 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1ff) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:04 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 421.485695][ T26] audit: type=1800 audit(1561870564.032:188): pid=23466 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17857 res=0 04:56:04 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x10\x00\x00 ', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 421.569450][ T26] audit: type=1804 audit(1561870564.072:189): pid=23466 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/644/file0" dev="sda1" ino=17857 res=1 [ 421.630767][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') msgget(0x1, 0x0) exit(0x0) syz_open_pts(r0, 0x4040c0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x7ff, &(0x7f0000000080)) 04:56:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:04 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1ff) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:04 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00%', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:04 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x420000000000040, @loopback, 0x7ff}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000080)=0x6) fcntl$setstatus(r0, 0x4, 0x2000) io_setup(0x3, &(0x7f0000000000)) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="381e20073ba892abb3bc84d0b9645d1d2d6218ba136a67594af9035c31b6d042aa53f34f1072d59c81ee9eb54cc125d39aae2ea25469323a55ab91217db51ded1121bf2089147f328338cf40f2007997b8027be3f2edee2499a100f8ffffffffffff8f94524466a60000000090540c0a51a6db85cdee5015de6748bfeb808ce31aef9ada8ed9820e32393c72d86d2a28a1480bb38cb4f8", 0x97, 0xfffffffffffffffd, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000001c0)={0x0, @speck128}) 04:56:04 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x1ff) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:04 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00H', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 422.520994][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0x7, &(0x7f0000000000)='self}[\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r0, r0, 0x4}) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r3, 0x0, 0x1) 04:56:05 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00L', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:05 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:05 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00\\', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 423.321859][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba0200000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:06 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00h', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:06 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 423.550628][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:06 executing program 0: getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='\x02\x00ear_refg\xd7') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') fsetxattr$security_selinux(r2, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:sshd_var_run_t:s0\x00', 0x24, 0x3) exit(0x0) sendfile(r1, r2, 0x0, 0x1) 04:56:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba0200000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:06 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00l', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:06 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00t', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:06 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2711}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:06 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x00z', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba0200000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:06 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 424.474763][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000000)) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:07 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\xfd\xfd\xff\xff', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:07 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:07 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 424.816398][ T26] kauditd_printk_skb: 10 callbacks suppressed [ 424.816410][ T26] audit: type=1800 audit(1561870567.362:200): pid=24221 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18108 res=0 [ 424.963531][ T26] audit: type=1804 audit(1561870567.362:201): pid=24221 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/650/file0" dev="sda1" ino=18108 res=1 04:56:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:07 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0x68) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:07 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 425.311915][ T26] audit: type=1800 audit(1561870567.862:202): pid=24344 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18107 res=0 [ 425.381513][ T26] audit: type=1804 audit(1561870567.892:203): pid=24344 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/651/file0" dev="sda1" ino=18107 res=1 [ 425.453743][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:08 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:08 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x0, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:08 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 425.903421][ T26] audit: type=1804 audit(1561870568.452:204): pid=24554 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/652/file0" dev="sda1" ino=18113 res=1 04:56:08 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 425.982914][ T26] audit: type=1804 audit(1561870568.482:205): pid=24468 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/652/file0" dev="sda1" ino=18113 res=1 04:56:08 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 426.154667][ T26] audit: type=1800 audit(1561870568.702:206): pid=24583 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18099 res=0 [ 426.182509][ T26] audit: type=1804 audit(1561870568.702:207): pid=24585 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/653/file0" dev="sda1" ino=18099 res=1 04:56:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) 04:56:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 426.364225][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) write$P9_RLOCK(r0, &(0x7f0000000000)={0x8, 0x35, 0x1, 0x2}, 0x8) sendfile(r0, r1, 0x0, 0x1) 04:56:09 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:09 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) [ 426.873072][ T26] audit: type=1800 audit(1561870569.422:208): pid=24711 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18114 res=0 04:56:09 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 426.926806][ T26] audit: type=1804 audit(1561870569.422:209): pid=24711 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/654/file0" dev="sda1" ino=18114 res=1 04:56:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:09 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x8200, 0x0) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000040)={0x49, "8e7228f050ed0c93753331016c8a4e4f04b57eaf72c7aa98e27d1654a30aa241a478ac8c2e6e78c31d573a1c4bcc40bc818c1b47a4f5adcbec6ba67d5ca845e51f7c91abd2d2b00ea20da8d7f2c7be3e008a89ad860bfb107faea0e234731943950df286520807ec28194adf6b9750a04b81fb106c3462c4d82b9290aad36234"}) r3 = accept4(r1, 0x0, 0x0, 0x80800) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:09 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 427.321905][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000000)={0x0, 0xffffffff, 0x3, 0xde}) sendfile(r0, r1, 0x0, 0x1) 04:56:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:10 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:10 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:10 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:10 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 428.107847][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d0000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffffffffffff, 0x501081) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @rand_addr=0xffffffffffffffff}, 0x4, 0x3, 0x1, 0x2}}, 0x26) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:10 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 428.332034][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x7) sendfile(r0, r1, 0x0, 0x1) 04:56:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:11 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d0000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:11 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:11 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:11 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:11 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xeac2, 0x422800) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) write$FUSE_LK(r2, &(0x7f0000000080)={0x28, 0x0, 0x1, {{0x3387b58d, 0x1, 0x0, r3}}}, 0x28) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 429.274329][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000000)={0x12, "ee590ec8069b9295edd5a9d662fa2970c29c"}) sendfile(r0, r1, 0x0, 0x1) 04:56:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d0000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:12 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:12 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:12 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:12 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:12 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x1ffe) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 430.333936][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') getpeername$tipc(r0, &(0x7f0000000000)=@id, &(0x7f0000000100)=0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:13 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:13 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x10000) 04:56:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) [ 430.738157][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 430.738167][ T26] audit: type=1800 audit(1561870573.282:216): pid=25387 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18160 res=0 04:56:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:13 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 430.787644][ T26] audit: type=1804 audit(1561870573.312:217): pid=25387 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/658/file0" dev="sda1" ino=18160 res=1 04:56:13 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 431.043685][T25427] kvm: pic: non byte read [ 431.056217][T25427] kvm: pic: non byte read [ 431.074613][T25427] kvm: pic: non byte read [ 431.106798][T25427] kvm: pic: non byte read [ 431.131085][T25427] kvm: pic: non byte read 04:56:13 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 431.161526][T25427] kvm: pic: non byte read 04:56:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x74, "143786ffdfa8faef75b67c781f580739cabbc64196a219370c2a39e87f0b0bc9eabeb2b991f92c589c9199fd13612d634ab1fe8e4d8d5712440323d80b61ecdb36d5ef81715421e51a6c2235ffd819a8f04d20ab6480cbb5dc8b35579facd00ddf76e70ec09ceb6aaa8f94e32a398ef84698039e"}, &(0x7f0000000140)=0x7c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x80, 0x7fffffff, 0x208, 0xe607, 0x10000, 0xfffffffffffffffa, 0x0, 0xffffffffffffffff, r2}, &(0x7f00000001c0)=0x20) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='westwood\x00', 0x9) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r3, &(0x7f0000000380), 0xfffffffe) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 431.188033][T25427] kvm [25392]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc2 data 0x4d00000000f 04:56:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 431.250196][T25427] kvm [25392]: vcpu0, guest rIP: 0x8a disabled perfctr wrmsr: 0xc1 data 0x4d00000000f [ 431.424216][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @loopback, 0x9}, r1}}, 0x30) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 04:56:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:14 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:14 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) 04:56:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:14 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 431.777547][ T26] audit: type=1800 audit(1561870574.322:218): pid=25537 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18150 res=0 04:56:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 431.845133][ T26] audit: type=1804 audit(1561870574.352:219): pid=25537 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/659/file0" dev="sda1" ino=18150 res=1 04:56:14 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) 04:56:14 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 432.005679][ T26] audit: type=1800 audit(1561870574.552:220): pid=25648 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18166 res=0 [ 432.060079][ T26] audit: type=1804 audit(1561870574.582:221): pid=25648 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/660/file0" dev="sda1" ino=18166 res=1 04:56:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:14 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x2, 0x73f, 0x7, 0x10, 0x0, 0x2, 0x4, 0x2, 0x7, 0x2, 0x5}) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fadvise64(r0, 0x0, 0x1, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x1, 0x70bd25, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000085}, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r3, &(0x7f0000000380), 0xfffffffe) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000006c00)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000006c40)={0x3f}, 0x4) r5 = accept4(r0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x2, "45cee14dcd186ada"}) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d000000"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:15 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x10000) 04:56:15 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 432.755008][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 432.766904][ T26] audit: type=1800 audit(1561870575.322:222): pid=25681 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18184 res=0 04:56:15 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 432.818044][ T26] audit: type=1804 audit(1561870575.352:223): pid=25681 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/661/file0" dev="sda1" ino=18184 res=1 04:56:15 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) 04:56:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 432.958732][ T26] audit: type=1800 audit(1561870575.502:224): pid=25792 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=18181 res=0 04:56:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:15 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:15 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) [ 433.023824][ T26] audit: type=1804 audit(1561870575.532:225): pid=25792 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir316303121/syzkaller.Jwr5H4/662/file0" dev="sda1" ino=18181 res=1 04:56:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) fcntl$getflags(r0, 0x40b) 04:56:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:16 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) 04:56:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x100000, 0x0, 0x0) 04:56:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 433.646164][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:16 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x0) 04:56:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:16 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x2000, 0x0) 04:56:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:17 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x0) 04:56:17 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\b\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:17 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x101, 0x8000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x4ff, 0x2, 0x0, 0x4, 0xcf}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r1, 0x4, 0x2000) write(r2, &(0x7f0000000380), 0xfffffffe) r3 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:17 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000800)="580000001400adfd8a987e40da2e6a262b", 0x11}], 0x1) close(r3) socket$netlink(0x10, 0x3, 0x3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r3, 0x0, 0x80000080000001, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @rand_addr, 0x1}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r4, &(0x7f0000000380), 0xfffffffe) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000340)={@default, @bcast, @default, 0x3, 0x8000, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @null, @default, @default, @null, @null]}) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}}, [0x6, 0x6, 0xc2, 0xf86, 0x4, 0x1f, 0x573d, 0x0, 0x0, 0x3, 0x7ff, 0x0, 0x800, 0x0, 0x400]}, &(0x7f0000000280)=0x100) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r6, 0x100, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x9}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f00000000c0), 0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x9ecb, 0x8, 0x7fffffff, 0x9, 0xffffffff}, &(0x7f0000000300)=0x14) r8 = dup2(r0, r0) ioctl$IOC_PR_RELEASE(r8, 0x401070ca, &(0x7f0000000080)={0x6, 0x3f}) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000140)={r7, 0x7fffffff}, 0x8) 04:56:17 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x0) 04:56:17 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\n\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:18 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) sendfile(r0, r1, 0x0, 0x1) 04:56:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\v\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:18 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x3ff, 0x4000) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000480)={0x2}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x0, @mcast1, 0xffffffff}]}, &(0x7f0000000380)=0x10) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0'}, 0x10098) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xe) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000040)={0x80000000}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in6=@mcast1}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) 04:56:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x20080) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x2, @rand_addr, 0x5b39}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r2, &(0x7f0000000380), 0xfffffffe) writev(r2, &(0x7f0000000200), 0x0) pread64(r0, &(0x7f00000001c0)=""/2, 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x9, @mcast1, 0x8001}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, @in={0x2, 0x4e22, @local}], 0x5c) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000140)={'filter\x00', 0x53, "33a9583f03a527a36fa20544c27e22c8ecc57157fb01fc0e1a14371cc263ee9c7c86dd4fcb4136332ee078ef4b83afa10cc67a813933a8f38b2863284eab066cc285c929f208de4e4614959dbee15cea5e8628"}, &(0x7f00000000c0)=0x77) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\f\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 435.611371][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\r\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:18 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x0e\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:19 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='\x9b\x9an\xf3A\x92]\x14\xc0\xff\x03o\xd0\xdf[\x95\xd3\xca\x90\xff\x1a\xc2\x8a6 Z\xf4)\xddy\x00\x00\x00tL\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00Q\'|;&\xe8K{\x81\xfb\n\xeal\x8d\xab\xd7T\x8a\xe4ky\x89\x94\xdf\xdfq1\xa8\xbd\x8d\xfa\x89)\xcb\xf5\xd1\x04\xe9\x94u\xf4U.P`RyO+\xb4%\xf2!R\xc8\x87\xc3\xef/\xfa9\x8a,\xd8\xd9\xb3\xcb\tU\xc1\xf6\x97\x1d\x98\xcbr\x9d\xd0BiQ\xaa\xd4J\xcd\xc6Y\xd9?\xf1\xd5\\\x17f8\x0e\xac~\xc7\xf1VhN\xa3.\x15\vN\xe4/\x89v\xe8\x00\xe3c\xf7\x00\x00\x00\x00\x00\x00\x13\xcf\xcc\xf9X\xcc$\x8e\xa3\xa2\x7f~\xa7\xf6\x8d\x1c\xed\b\x9eq') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x3ff, 0x4000) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000480)={0x2}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x0, @mcast1, 0xffffffff}]}, &(0x7f0000000380)=0x10) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0'}, 0x10098) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xe) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000040)={0x80000000}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in6=@mcast1}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) 04:56:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x10\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r2, &(0x7f0000000380), 0xfffffffe) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x11\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 436.607628][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x12\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00%\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:19 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:20 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) 04:56:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:20 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:20 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000480)={0x2}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0'}, 0x10098) 04:56:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x838, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80, 0x0) ioctl$VT_DISALLOCATE(r3, 0x5608) fcntl$setstatus(r1, 0x4, 0x2000) write(r2, &(0x7f0000000380), 0xfffffffe) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:20 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 437.641263][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:20 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:20 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:21 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clN?TF\xb1\xba#\xc3\x89%%a\x04\b') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:21 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x3c) 04:56:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x3ff, 0x4000) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000480)={0x2}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x0, @mcast1, 0xffffffff}]}, &(0x7f0000000380)=0x10) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r2) write$binfmt_misc(r2, &(0x7f0000000000)={'syz0'}, 0x10098) mlock2(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xe) 04:56:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80100, 0x0) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f00000019c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8, @bcast, @netrom={'nr', 0x0}, 0x2, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000013c0)=0x0) r4 = getuid() lstat(&(0x7f0000001400)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001500)={0x0, r1, 0x0, 0xa, &(0x7f00000014c0)='%md5sumlo\x00', 0xffffffffffffffff}, 0x30) io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) r8 = getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000015c0)=0x0) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() r12 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000017c0)=0xe8) r14 = getgid() sendmsg$unix(r2, &(0x7f0000001900)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000140)="47285238d1d94496f1ee9cb5d4ccf9803b6d2c3b1911624df0830ab076cfca8c50a4d680d90904817c2761460bc9d032181057d71ac5cc9c0fcdeb0f6475ef64d6b3f09065441edee947bcf4afc44c23db1b2895c2c92f4f4cef944a0190e52ecbff2f2c8edd0ad361e397116181c7eefb924cc5b9ae33e100c5ff0505975d150af43c6f7e3c5eb60e7c692d62abc9c0be42b96087df909139b3ecf690265210810f81042cc36a4282b3a05c0a4ea037e954d2442adfe36c85db1ef30d460b6b98cf4bdd227c425cea92634ff531a6de55279edb9836f97d2689fa8700bb550afbacc012028df5ad040729bb9445bf116f29a65487aab85849e9e3", 0xfb}, {&(0x7f0000000240)="45635be8128c13e5639d83a2e1021c86f2b5714d37dc212bf5f4555009255932d15bb9e314303df28a2dbaff5fe1aae6a368325a198c33da91f20a02921480ee5b5cde216921ad7beb10390ee23f420ece2f677cdb94ff074a62a1686a84e17535a31edd1836afd6014b12b0de31c6876e34fa0d36625a6e56fa1ee593391d28fc49282e3b4051e1115b30accb6cc88a60860812d38bb592d2fc74f0d8538ce9d3f97dfee4b5199acc0ec6753112a344251df1c81f6d2c85cff3dbc2ccd68474dcea797cd6d5ff3a820612a085a90de26729a3242cea", 0xd6}, {&(0x7f0000000340)="6b2437fd90ef49b2ccbd7502d28c453a019312f13d2ab6188cd04bff0c0f39fc3b152fad420a23d20e7eb4028a9e19b525f3427b2836b3d019d2363b57ad5ce387eb1f21e29635b61dea2c50870d826cf559f7cb85ab8ae63d913c1d28933edc19282b7291bf384edbf36565587aec1df630080276fc35f5bb97152468", 0x7d}, {&(0x7f00000003c0)="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", 0x1000}], 0x4, &(0x7f0000001800)=[@cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}, @rights={{0x20, 0x1, 0x1, [r1, r0, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r1, r1, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, r14}}}], 0xe0, 0x24040004}, 0x4) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000001940)={'filter\x00', 0x4}, 0x68) r15 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r15, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) [ 438.586863][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:21 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:21 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:21 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) 04:56:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 04:56:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="116501055ee5cfec7be070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1000000000054}, 0x98) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) 04:56:22 executing program 4: fstat(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000080)="54a5595023f56f61a51bc26e2601340d1289fef5e9bec2202d92cf4de37df4efa97665ad8f54aff712686504f099", 0x2e, 0x10001}, {&(0x7f0000000140)="75d3bc8b0b942a8d2718f82de8e3ede7cb6a9eb6935d4340c20951bfa39bc69daaa66a6d451f21369994b96cb2a5c6db2bd5d1b0398458c7c52c9c21a3e24bfdf45ea8ff8f94610736be745c865c8de3508c0bdd58165084a7127849c39f8d9ce8ea33d5e09bf0", 0x67, 0x100000001}], 0x10000, &(0x7f00000002c0)={[{@fault_injection={'fault_injection', 0x3d, 0x9}}], [{@measure='measure'}, {@audit='audit'}, {@euid_gt={'euid>', r0}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_lt={'fowner<', r1}}]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r2, 0x4, 0x2000) write(r3, &(0x7f0000000380), 0xfffffffe) accept4(r2, &(0x7f0000000340)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, &(0x7f00000003c0)=0x80, 0x800) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/loop-control\x00', 0x84041, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 439.513856][T26713] erofs: read_super, device -> /dev/loop4 [ 439.541788][T26713] erofs: options -> fault_injection=0x0000000000000009,measure,audit,euid>00000000000000000000,mask=MAY_APPEND,fowner<00000000000000000000, 04:56:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 439.649013][T26713] erofs: cannot find valid erofs superblock 04:56:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:22 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r3, 0x1, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x180, 0x4c00) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000040)=""/121) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r5 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x10) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) bind$unix(r2, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) 04:56:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) [ 439.917886][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) 04:56:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000001600)=""/70) writev(r0, &(0x7f00000013c0)=[{&(0x7f0000000000)="3c81bcf22c022ef078feba5c68d14ca0d8a6a2181d98dd659981aa80bdbc91a8b6beccd8b02d8b124ebfb151c57503de3b38a990e79366157faa9f1c5fd8419ddadf70e4b2802452bfdc0a760f89fed67b8b79642c8527dd97622807940d040993d19ae66f50debc9c9266df3094f3f4874ecba9b77be161b947be125f0483e3fad78aefa7312e4ce0d8be3a7c2e5521458c74f93890a0c39739f89eac8bc11712dc3d475db144c3209efafb6a8c049b0f92465408f737e05a1b7a5e9b3f0c9bd02d49a1fd", 0xc5}, {&(0x7f00000001c0)="35ab25fca551e392f7075bf0f260fd13db224696feca364a7f702464d7a272a43d2cb9928274726f507541338b0721be97260647e9ed143f4f71fba3d436b2551ace61db48426fb85a264b201c434dedff95b47ca20a529ec855e2c80168135f60a36c160d6893e64a9b2a4561440c6b8480676edebffe2daa3109ae7a7c095b6aaefaff6ed8276d51ffd292377a07e741eed644003b62d7894795ce26221d447562d4c5d7d67756b4681c67adbdf40cd1a7e14b0fba0bdbf5", 0xb9}, {&(0x7f0000000280)="076d67cdeadff0bcadfd0300430783dd0276fe27a4acfd4dde1eadd4c93c1a90e6402e1216c65210090a5525d7c293ad5fb799d9b6a9c5612b01e6deda0067a26b6f30458dd8e26cb503f0ab0ce5f09fb9ad899600e51ce2b179db513fe686fab7db1a633948b4517aef0df57217546c557ecc08b6fb6ed9c85c34bad16c5961378f994a041e", 0x86}, {&(0x7f0000000340)="927caf31dcae88671e9b7f2080a1e92edb1fb48914f851290641f5e75257a7e753c57561517a073dfca2e8ef25b4f215300140e4c3e290e85b9b880c79244bba728a16bd8ea140f35682e73598b7707ed39d64ee0df1fe95666b7fe6fc4b3f164ddc3a7d2b", 0x65}, {&(0x7f00000003c0)="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", 0x1000}], 0x5) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001700)={'batadv0\x00', &(0x7f0000001680)=@ethtool_coalesce={0xf, 0x1, 0xfff, 0x7, 0x0, 0xa32f, 0x3, 0x2, 0x7ff, 0x2, 0x7, 0x9, 0x80000000, 0xfffffffffffffffa, 0xffffffff, 0x8, 0xfffffffffffffffc, 0x0, 0x7, 0x2, 0x31, 0x9, 0x768}}) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000100)={0x9, 0x802, &(0x7f0000001440)="3fd6b416cc478b35a88793e5582d40215a02b4e5aeb0a5fe060836347add24264728b5f4784460b767901c33c6c503a1123b0e6150a80294a94fca26d95a705ab0c9c9f125cbf7ed1e412e8edebd7ff4056ccba8fd09331ee8ae47c500bc9fbb486730654ef3cf30fb8bcb18083e7737ba6536d1f1647477e013cf01ca7a5d5fb66b0334253a9c84a2b5", &(0x7f0000001500)="c51b849cc60afdabfad024a19cf47484812cc4f38570257fbb2ddececf4013c0da2813432ee4004e96568c46855cab30a1c04427bad565aaa13dd291d78e94ccb59437c7d39179925818bbc11110712233bcb08342198a72a3bb4cc5d15f46b4a9625be162c490bba3099ce87697bdafe2e4cf032bda43e21d1cc8cce2c7fe2cded35c440cefec5df97d71a49552e328cf14c06f1b6fdf83f5eb89b6f2c852dc5ad2267248fee28e1756122cd250140dad48b7b0ff7e514bc6d14c8a4edb339989406d151ab67b149c8bac88266912f496b79c3e7abbea2334", 0x8a, 0xd9}) 04:56:23 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000340)={0x204000000bd, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0x408c5333, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:56:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x5, 0x4) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) [ 440.880336][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:23 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f0000000000)={0xa, 0x4e23, 0x10001, @empty, 0x1}, 0x1c, &(0x7f0000000040), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="70000000000000002900000004000000000a000000000000c204000000070001000740000000070e03070001040000000000000600000000000000060000000000000004000000000000009000000000000000010000000000000000000000000000000107000000000000000000000034b7119ef2606a9ac9324dcdb25d46736fb758afc55fc98a60a37bb471fa4af33868e05b6e8c8fe4faaa559adbd009cbc42024f56983c3331f"], 0x70}, 0x8010) sendfile(r0, r1, 0x0, 0x1) 04:56:24 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) 04:56:24 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0204", 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0xc0, 0x0, 0xffffffffffffff37) 04:56:24 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000380)={0x0, 0x2, 0x5, 0xfffffffffffffffe, 0xb3ec, 0x2, 0x3, 0x1ff, {0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x9, 0x2, 0xff7, 0x0, 0x7ff}}, &(0x7f0000000440)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000480)={0x3, 0x2, 0x7, 0x4, 0x0}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000008c0)={0x0, @in={{0x2, 0x4e23, @loopback}}, 0x17, 0x200000000000000, 0x80000000, 0x7, 0x4}, &(0x7f0000000980)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000002c00)={0x0, 0x97}, &(0x7f0000002c40)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000004200)={0x0, @in6={{0xa, 0x4e23, 0xd2e9, @ipv4={[], [], @broadcast}, 0x2}}, 0x2, 0x8}, &(0x7f00000042c0)=0x90) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000004980)={0x0, 0xf0, "2218429c433b1602b500be76e8b5057c0c7789a989e5f4bbd2fc75a86dcdbaa49a80b08c54ff62d62d127f8c4de87d4d5e4e93a695b8870730fa346dadc9eecb16d7f58866748e6575999bb370b1df2546870f6b253ef1b1ca5eb376820fe0b96862ac87df0cda60c258d1ecd80675b8dfb7b2117f8791dc3528817d3306106e396785a3164acd33ad9d29629e3b0cc5848f4e1781ec9f8abd30e8e734cae39364a3249a27fdebb5a50c499e9994c92a5ab8899da81fd69d29e388340100836d11280f5f5bdd067daaafd990718fdc35cd935858eedc3a7839cad5779d6e76da0e45e347967f29a531cd31fe3180e27d"}, &(0x7f0000004a80)=0xf8) r9 = add_key(&(0x7f0000004e00)='logon\x00', &(0x7f0000004e40)={'syz', 0x2}, &(0x7f0000004e80)="27e11118aea3544bb4a32e0e6843272cd3ee6a2b2f2097cd2424cf1e7900ffa0786d3c6b0ba82374bff4bc36b4c1e6644cce92c093036e0f2a26257f27543f2627f1d6a335525257a5af2931d2772a2a9034831272e79a2cd27ee2e5a7013ec67a653af5c9c9d7e6003e4828bd11ae4954005420095cc4c8822882d1b103219f3783a1a0b7b20509d395905e2c4be4ed5aa9e8321c59287f5d16f33ae10fc36a74c2049a9f5e2098338e95fac8abaad80c40aefc1bbe25b9", 0xb8, 0xfffffffffffffffb) r10 = add_key(&(0x7f0000004f40)='asymmetric\x00', &(0x7f0000004f80)={'syz', 0x3}, &(0x7f0000004fc0)="116d70ff7046cfbc57bcac531117c560ee612ab2a4dbc86071a1ae710d4232c893c7deab0f19f21fce02f09c69e714e8d984014d1d5d9340e31e13d9843a138db9451dca06ab40ac8f0af0c0eccda7fd0d51878c7708d34ef735f708ad03207a846db2a07d9bc7e8afa11e6fcd4ca8439e1c31df27ebae6f3ee749f5fb9d1c95ca1a346cd51e39b47bf88872e128625259a8a86001371187dd7bb60943ee802ba7233b3c1ebf242df0edd777658cfbe69dcf07f20ea6f7588e57adfd76fa2a3520ccf1e35c87d9cdd4", 0xc9, 0xfffffffffffffff8) keyctl$link(0x8, r9, r10) sendmmsg$inet_sctp(r2, &(0x7f0000004c80)=[{&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000040)="3de5e2302c204c6fd5dce85eb0b4ff9b37b81ea431fe", 0x16}, {&(0x7f0000000080)="0d43d96f74c8ba9a960308802d5af1c93cff7f646a07847b2d9395d5d4c83b62cc5c453f21c1488841f41cdc08cf41aa61f269196114ed7d097c0bf8b6e98228a5105b89c734b722dc5894fdc3cb31c67fdac8cb5e834dc06f0ca8f9d96df96bdeec1f70c3521ec0cbb44830b6d7c60cce1a14ecfd6f", 0x76}, {&(0x7f0000000140)="7f805dfc4d8c643c6d9c759a36a32a8d502b395bb78e55766a7be822c32765cf370152", 0x23}, {&(0x7f0000000180)="2817fa3cd864f4dd0d5dca42dd4d7aaecd429925a0f227d4c5b9260e291d8a676e2e24b35dc78b7a758f59ae043b99596bfdc378bf637453e96390eb2270b9736d12bd03b42d905c3a06c60697e0c65eabfcee23921d5c14dc1910b702dc5ad0c79da215fad257e1e734ad7c4d308e10787d44024eccfa24477de68f145e8670414de412f8ad2da61117157dc9aab5632b668ad5ddf6afa8afdf4df84e663649285223f436d8df5e3a5bac51db78fe2fe354e976c256cf2b9ebdbc647a7e2727cfa59fdd84b3a8553b9f6309a7b163d543f632a478de67cc7a5e862a27cddfbdb7737b93cceb6336f70920407517c53cb2cf274067973d7ab538096c4fc4", 0xfe}, {&(0x7f0000000280)="bc9563c0317b9c901c25d97b57bbe94117a9bbda31eaa8a26ab5b96b542bdd8cb0cfe238c190a6007c200124f910da47436d3c7bf1a0a22cbd70ac06aa29c79592408ceac4d4d429449a3a03fa979c6097612202a87d2b064e514433632f140827267a9dd78e6643d8dac83d7ab16de77659", 0x72}], 0x5, &(0x7f0000000500)=[@sndrcv={0x30, 0x84, 0x1, {0x101, 0x0, 0x8004, 0x1f, 0x0, 0x3, 0x6d, 0x4, r3}}, @init={0x18, 0x84, 0x0, {0xfff, 0x6, 0xffffffffffffffff, 0x2}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x852, 0x200, 0x7fffffff, 0xb5, r4}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x6}}], 0x98, 0x40}, {&(0x7f00000005c0)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000600)="532069e704e5c7e11f9b0b2ab6ed3357950f1f718199a36bdcfc6e4f04df0212b1d97ab424116e9cf66a283e648090155b9d8978dc68c567e078a6ddd159dc61e8069e4a1257736a9daac826aba600175b4bc4d44d0ddf6806f281297c24e5af58e7a930d99b1846b13e48e11db27632483b984cfee393d3182b2b75196876e2d7cf5b67c9c9694037dd429e136ed440133becc5f191f68e7d42ca39ee07d7c6ed1d137147855743c57dcb", 0xab}, {&(0x7f00000006c0)="6999badb6fa66cd015bd941dfad2aff9e6f8ca09", 0x14}, {&(0x7f0000000700)="b35000d2aa283a91a742de9da6eabf7294c3ad39453ff5467a142c490439e9396d1a69ab3ad362ce5a2a4b7d57c93ac14463733bd65d16ae6a719f28f53f8afc83bd8b9ead26848688fd6baccf416b0bfdf6a229620948a5a88dd684537fcc782cc26b006e3dfa3ac9b3d73cf674b5b81fa80afd8ecb4b400cfebb1ba9efceab3f97da70089e217ba9e743a5c1e167878c08e1521303edce88c680dd1dc821df5f7dde14de37fcb83aec5b9922e94ae5032470b1ecee9be1d6d30df6b980204b06190f8cd26a67f56674637069e0d580649e7666488d164749e1", 0xda}, {&(0x7f0000000800)="3bc91549206bcca5702324791840898ee350031df447a794a2cf72944b8d1d8910a885dcbddb5e34596c99e920d60639845db4d0c2da1e7c87bd2f7280231f11bc04b7d12eb18ffc70effee1c9748357d140195463f394f8bf342412d96657191ce8eca9958a3a690d7895db", 0x6c}], 0x4, &(0x7f00000009c0)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x13}}, @init={0x18, 0x84, 0x0, {0x7baa, 0x100, 0x2, 0x2}}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0x208, 0x1ff, 0x800000000000000, r5}}], 0x50, 0x11}, {&(0x7f0000000a40)=@in6={0xa, 0x4e20, 0x3, @mcast1, 0x5}, 0x1c, &(0x7f0000002bc0)=[{&(0x7f0000000a80)="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", 0x1000}, {&(0x7f0000001a80)="b459a1dd0274812c8adc959704f2761d3a460caf3935ab0e3c132475e6", 0x1d}, {&(0x7f0000001ac0)="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", 0xfc}, {&(0x7f0000001bc0)="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", 0x1000}], 0x4, &(0x7f0000002c80)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x1f}}, @sndinfo={0x20, 0x84, 0x2, {0x6, 0x1, 0x4, 0x80000001, r6}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}], 0x50}, {&(0x7f0000002d00)=@in6={0xa, 0x4e20, 0x81, @mcast2, 0x1}, 0x1c, &(0x7f0000004180)=[{&(0x7f0000002d40)="c7efa8cecf192b4253e300f7b87a0e01823325bdb016", 0x16}, {&(0x7f0000002d80)="9d22ea604256829445a3237c0809ee0a2eb25b25f5dca43014b839ea3d29d4b0fe84a079b47f65853015c0a2ae405baa6b268616078bd33c7d9f6927b6e48a3bba00e33775de6094ee5461c837ca28f6eaaf04b02ce975650ad59ac01a92fef5a289651aedee1dc6bb7edd75307da5e34331d7b3baddaadcb57927da4146fcf10d9581058c68fcab66354392a7b7cbb3bd513314abbbd81a92532cfbffca5486e945c2bf4ad72946c3", 0xa9}, {&(0x7f0000002e40)="139af8d5f87f8b570d69f8c23b42abc1513d204179aa43c8edc8cea43f199ba759ed643d9160c8d346ee33ed3a5307b29876643b4785d5fe66385d03eb26e417da31b38a621e8250dfd7b907d8af04fb7538c51c2f97", 0x56}, {&(0x7f0000002ec0)="9e61cbea4208d48530c39f113afad1721ba068fd9f9de7ac91b0aec41a78597be1689b8d85b4ae8caf4a7f3a650486c7d70751744a0351b776e13e5424c8dfa93251225b5ee43b663882ac06926cedc67fed95f37208c9f3e99c3efdee3f96", 0x5f}, {&(0x7f0000002f40)="aadb1edbda4980dcbe9200d7ce9ba46710be8fffcb0987a12824ddad178b5b89cfc51951798ea74f76510dfb90f542a25e4d566d00b6c56acd5983f4e081958583781ba4de15db551493672a91a666860b5d3e444782abc6f48207b628161a14a04584a60b6da82984a500bd88dd0753a12b9770fccbe2d9f070748de96609896a6219e79a724a9834a20977242648f9c87c2f84260c909d3eb4f4009d7c208d63b1d7fa", 0xa4}, {&(0x7f0000003000)="6f603d03fdc7ae67920d876d28c6702ae6ea35dedaab57a810fba96476225c67738a4c25d60635ce2f4ee2e5f39644d7e8f6326a208ce9de9ff7fa42191c7dfac9c43e4bdc42eeabb48548190ffb3b3ae220cff0f2ae444913323916ee10d3e1f4cbf1581434731bc4b862150918031e31da43327a8c4e012a98257e32ad0b64310d4eaaf3b4a25e98076f2f41075d19e30a773444706f55", 0x98}, {&(0x7f00000030c0)="af1ea5cbdebc557d5e3321caf7fb905813dcbe7013d1f79df8821880c32c418a3bb374c4288f09265aba7106c1f6ca196d5fe8526a993619270549f1dab2bad66e2a18b496969742a48939a43f241bbe8f14e765c7d1817964c8c2fb508fbc67a28597c0046596be404c0e0675e2c9a55d984b9546dae90a81cbea907d0bd126231581b3d568774afdb2219a8b964b4eb0160e98c0a3ba1022243d3e93d11a74c6fdcdc7f8614a14b4ba0064a3e577a7ff3e8e", 0xb3}, {&(0x7f0000003180)="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", 0x1000}], 0x8, &(0x7f0000004300)=[@init={0x18, 0x84, 0x0, {0x1ff, 0x40, 0xfffffffffffffffc, 0x1f}}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0x200, 0x3, 0x4, r7}}], 0x38, 0x20000800}, {&(0x7f0000004340)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000004900)=[{&(0x7f0000004380)="f4264a121a600c6a50372c4b7db510c1cb4bf7985fb12f6b9a7d5d6c7fe19512c5ecb45a00bfde70824f21ada22432ff3385d97f1e6ed3f4176b2947586f8edad630a66c0d6a93014c94fc7141c888a0b660ed3b93495c2bf64c91e1e48281e4b88e50001a8c1fd7a5cab4243c9aa34ae248f20a32972388fca9541623fa669d7042e96bafd9c93fb31887bc7864d7d3eb8d0577ace5e798ff0b5655ba", 0x9d}, {&(0x7f0000004440)="e590195db66729f6c1102a07cd3464d4be33a30fa53b93ac14eeec0b7984ed3d311f12d766b5888b1f8531be36eacca67aba1cd36f44ec9c7c9b552e04ea77a87354e54fa501a97c1520d6303a4c001fd62bc932db279e0429341ddbcb74caec3711aa4e1dc9b6bc983361f5ceda56e126fdbcee42aca8bab2d964d63d7355cf064421016c8f2c46278d58dda92c3cb757a24c0a20dc822ede305c0364da0affbc04f6d731b4db93621719b2652b446b8687ee891bfba327120cb45e5f9b73bdc842b68811453ffa3e7f01975099897b25c8e583c1d129d85a0875ee6598fb134629ae023b", 0xe5}, {&(0x7f0000004540)="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", 0xff}, {&(0x7f0000004640)="b5171397982e991fa8cd700ef6456b81489bd345c5367b7a56b9a1c8073fd9ab95bb12daea482b0088d1bacb72815e8841392208a68fa25db601175e3f8c230506a2a1af57f90e89b447c3da1b62143bf0accba54977c86c46da82d60b639d2b9974782ce03b89b291077f0b949a30eb46b91ffb2d540ff0a35d66", 0x7b}, {&(0x7f00000046c0)="019ec9924a96f8e3264f920e540cbd0c0205ddea36314eee51230d0ae86da01292230a4e4eda9244c401f5b4f8b016ba69b0f0267fab4d19b09a284b37c2f4f0b516bf8c81cbfaa6598ef0da68b69bf43f973a2ba87b2c9280f62dd7484867f7f79aaa2887eaa2ef364ebfdcb592e218cdc21595a6683f63842bc147a56687d767d07996aeb59e03f1b3e443c2c5ce20dd847f1af11d9654328ff7d9814ca1595c8434aec717b04bbe6a0472b544f0194b8e09f4568698b28b", 0xb9}, {&(0x7f0000004780)="16fac5b001602092d3ab83cc5788e078d24136999499f36b3b9cc29e23bd8cef49f2da7463569ea7972bf11e6175a27be0751bb9871675ecbe09f8f388c724ff4e0b1e8bfa868acc7bf50f3a0af67ce2c54db9e29b67a5d59f625d8f8c3c7b49a1b976a3e68bd71c963db7d1c87ccc1ad698f243ef8e37605b9fd63f5f209b1ab193d5abaa68f9466eee2b255f58995ee52fb367b2792cf2b0", 0x99}, {&(0x7f0000004840)="29c3a769ea60cab4c6b0497e3d66ae3ec8232912eb3b5559430fffb81451f486117b028357f3603ddaef574a3a4dc4f33d2a61d9bf80fbc866ba0544707ee463c1f0f5fcda8ed0497f3cb9305a4c8ce333eb0f8985e10fda0eb630c76f9050421d5872ee9b1a394e58a3c11c64b3c6a27266f8c2dac6d43c4cede199787efaeba5796e231913ed5e144ab10603d3cb5cbecb8afdfd403745f6acf171ec5c616c99b72e4444", 0xa5}], 0x7, &(0x7f0000004ac0)=[@authinfo={0x18, 0x84, 0x6, {0x3f}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="cbc08d7c143bc0add52284b297c1f893"}, @sndrcv={0x30, 0x84, 0x1, {0x4, 0x8, 0x200, 0x4, 0xa6c, 0x7, 0x9, 0x1885, r8}}], 0x68, 0x800}, {&(0x7f0000004b40)=@in6={0xa, 0x4e24, 0x0, @rand_addr="642715f1762744d2288c20bd9d0e51d6", 0xdcaf}, 0x1c, &(0x7f0000004c40)=[{&(0x7f0000004b80)="d9e6381621700573b5ec4c535891c031bd675d1d7b2ff104ab72cf3c76b5aeb9ed69e5f5d82321e28e0a185832e71284c621aec6cc27c45bc84e1b232b0b18f72ecd104e01991bb5bf7e2a49bf2938a6c85ac5a82f0373ae9327451c167471f309a698900293608c1be1bb0df668b874b4499754742f0c6d1e242a05f5120af40d327a43dd958697bfb930b3079dc3bff0b07d5be9fb3f2aed5979a84bfaf2ca49d9e0c578498cc4fec18259", 0xac}], 0x1}], 0x6, 0x4000804) 04:56:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:24 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00%\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:24 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) [ 441.855724][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:24 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:24 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000840)) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000010c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001100)={0x0}, &(0x7f0000001140)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000f40)='oom_score\x00') fstat(r1, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0xa, &(0x7f0000000640)=[{&(0x7f0000000180)="bfda56b64734a3750e6992a9f0d84ed535f170dcb7b723deb4bf5ad8c1334a4ce8ef454f7d62a18c9a74802ac38638e5adb3cac0ff4daf7341dd89ed8a2674acc076b05cb66053ad9e2d67083586273c3d97591015525ca9200779bc7dd98df5ad083997bf63f1a4d584d68a43bd15bbddb9e7d36e574c6a65fba3ab9985e98fbaf3117360c8c5d3a77ec09680cfc28ff14b3673e690b7a0619afe5b8f2060703255bf641fe42ca550acb40fc341451bbd463796b2bf17e4accd0dde3fdbb72bbd5776a20bc85f1af548fab02a68149e75a9d0902f7e10ed03c8", 0xda, 0x1f}, {&(0x7f0000000100)="733dcdc6978f5f12cb8d6f05c013e712be455a0873d129307a237a51de478fda062d60bdc185ea7c697d36e6b554a8e9d2b0aa", 0x33}, {&(0x7f0000000280)="33a17f58f891430fecd22fa0f4f412ea6026aab783b8789d4b15fed20ee43782734b98af37146d3cb3", 0x29, 0xffff}, {&(0x7f00000002c0)="023ba4715bb1503b23b607b12a3c543f04108ea2890d8af4286d412c6f8c0ed75906b5c0210f80681a93efc04c59d724c8998a95e0bc5e6bf62c84656af3070a682a6b5f611cdd58e0d22d5d57d10f8746a7222e1492aa4e191954f3a5c571cee3e13a0265f1d65c13c155c43cd6ef65f23aa352465263451ff7ca5d451b254ab364674d7f4ea9635ca306a61624c6631a7a6b81", 0x94, 0x7}, {&(0x7f0000000380)="3ec1e5b2b8d074cda8942c4c9a8788cb7ca08908026ec7bbb88ce0d6c26f5cb7b1813564240ad985806313f0e668e4e833c0deea57f66decaec01a8ed5067882980bffb567570ed339a2bad873d2643248e939176ef78e17090a61dde1193873537a612221f3859018873d8ab745b2b56f050aadc153dc925ab88f55c5498d49b1a1028a2a74f6816a5a403168a8e7c819", 0x91, 0x40}, {&(0x7f0000000440)="83b00d038f131984d392bcd17c634b942e6cd2acd3b672ef9067b3cadedbc715c1708bf60e393692ddf84cc4dd01324467ef546e209311717f52667beb1a", 0x3e, 0x6}, {&(0x7f0000000480)="97e007faebab42ac2177c09d9fcdab1b9b75f7cb05b405a675dbae48147d0bda639c27e5e7555465b0de674cd1d11408c6edcde14623ea253332c87858f2ea333ddb40e2cf23c0b5fe526a4cf8bb6e3d6995f15dec90e1614f278c2b720adbb0de985d29f388cca03e7cdd3f2a7bd9cfbd8c9f9e57ecbbfa4247776f806f023176fed5593ed882dfa0d54f656950b34368ed77f4b30169", 0x97, 0xbe}, {&(0x7f0000000540)="2e1fec3bf16315fcc6640b63aecc52b398efdbd5a30a826d87c57a461361089ddcda034ec982124402c4a18a99afe012", 0x30, 0x2}, {&(0x7f0000000580)="0990d18748ed1690e0e9a73fd6256aef6f50367966fd9441febf6372e71cfd5c537f8a40ce5b17c2af4d029d8057ac6c31ac3ce14332fd0d2158e439df1eb444cd4102341f0896fa2f800569fed66ddf7005d6f88ba0f44f3937ba6e366d2efc7794c571129aeaea69fc6c", 0x6b, 0x5}, {&(0x7f0000000600)="98249ed46bb33ff779b13047c15e640744a5cd9118b3399bafb116a8a0f449afcf76358eceade157", 0x28, 0xfffffffffffffa12}], 0x0, &(0x7f00000007c0)={[{@rodir='rodir'}, {@nonumtail='nnonumtail=1'}, {@uni_xlateno='uni_xlate=0'}, {@fat=@debug='debug'}, {@uni_xlateno='uni_xlate=0'}, {@shortname_win95='shortname=win95'}, {@uni_xlateno='uni_xlate=0'}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) r3 = getpid() r4 = syz_open_procfs(r3, &(0x7f0000000000)='net/ip_tabxes_makP\xa9}\x8f\x1b\n\xf6\xde\x97;\x8etches\x00\xe2\xde\x1f\xc4\xbdax\xf2Y\xa7i\xe1\xae\xe6\xbc\xb1\x85\b\x13\x1e\x8f8*\xe5n\xfb8\xaa\xf6\b\xab\x9e\x9b\xfc\x88\x11]\x1bt\x9c\xfa\x05\xdc\xf6\xd7\xeb\xcc\xc0\xf1<\x1c\x8e\xbd{\x93i\x06\xa8\xd0\x9b\"\x90hf\xe8\xe5\x87\xb8\xfa=\xf1\x88\r\xc2\xc8\x85\xab\"c\x00\x00\x00\x00\x00\x00') exit(0x0) sendfile(r1, r4, 0x0, 0x1) 04:56:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="6d616e676c650400d607f5110000000000f326cc8ee300000000181b526bb5957004b38e000000fa0000000000a300000000001f000000060000ba020000000000401bfa9d209a72cf0570572d03003d0d00000080"], 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) 04:56:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:24 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="116501055ee5cfec7be070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='gretap0\x00', 0x10) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x70, &(0x7f00000000c0)={r2}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e20, @empty}}, 0x7fff, 0xffff}, &(0x7f0000000000)=0x90) 04:56:25 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1000000000054}, 0x98) [ 442.551804][T27397] FAT-fs (loop0): Unrecognized mount option "nnonumtail=1" or missing value 04:56:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x101, 0x2000) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, 0x0) r4 = creat(&(0x7f0000000340)='./file0\x00', 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r5, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @remote}, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, 0x0) getgroups(0x1, &(0x7f0000000380)=[0x0]) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x30000, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) request_key(0x0, 0x0, 0x0, 0x0) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000580)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) fcntl$getown(r4, 0x9) accept4$packet(r4, 0x0, 0x0, 0x80000) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) r6 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(r6, 0x40107447, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000400)={0x3f, 0x1, 0x3ff, 0x3, 0x7a6}) 04:56:25 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:25 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00\\\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 442.799170][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:56:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000000)=""/190, &(0x7f00000000c0)=0xbe) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x3f, 0x8080) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000180)) r3 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x4, 0x400) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000240)=0x1, 0x4) write(r1, &(0x7f0000000380), 0xfffffffe) r4 = accept4(r0, 0x0, 0x0, 0x107) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 442.997378][T27517] IPVS: length: 190 != 8 [ 443.074600][T27521] IPVS: length: 190 != 8 04:56:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000080)={r1, r0, 0x80}) r4 = add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="c15bd92d930426285b2e59de92522056af8210e7ebdb956cb45318905223aa1e4c401ce9b77f03d3e1cbecb548d37657077a899be052c9709c760a1911e37967742ce0092337693433af5a1e411860816ae335ce0bc695d0b1c7b2fdf0b0", 0x5e, 0xfffffffffffffffc) keyctl$get_security(0x11, r4, &(0x7f0000000280)=""/239, 0xef) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x4, 0x4) 04:56:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:25 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) recvmmsg(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:56:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) name_to_handle_at(r1, &(0x7f00000002c0)='\x00', &(0x7f00000004c0)={0x8}, 0x0, 0x1000) 04:56:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10, 0x80800) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r2, &(0x7f0000000380), 0xfffffffe) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) sched_getparam(r4, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) [ 443.345094][T27523] FAT-fs (loop0): invalid media value (0x6f) [ 443.359361][T27523] FAT-fs (loop0): Can't find a valid FAT filesystem 04:56:25 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:26 executing program 2: time(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x1200, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x855ad000, 0x3e0000}], 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x408000, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9) 04:56:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x3ff, 0x4000) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000480)={0x2, 0x9}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x0, @mcast1, 0xffffffff}]}, &(0x7f0000000380)=0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r2, 0x805, 0x0, 0x0, {{0x1, 0xffffffea}, 0x5, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x43, &(0x7f0000000080)=0xf5, 0x4) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r3) write$binfmt_misc(r3, &(0x7f0000000000)={'syz0'}, 0x10098) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40342) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0xe) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@remote, @in6=@mcast1}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000100)={0x0, 0x4}, 0x2) close(r5) 04:56:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/rpc\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 04:56:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00\x00\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:26 executing program 2: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x0, 0x0) dup2(r1, r0) 04:56:26 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) recvmmsg(r1, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="a514a2f3ca730e79aa159c654e71b855b1e8bf4495ea0bd03acc5dc8379352", 0x1f, 0x0) 04:56:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000140)={r3, @in={{0x2, 0x4e20, @broadcast}}}, 0x84) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) fcntl$setstatus(r0, 0x4, 0x2000) write(r1, &(0x7f0000000380), 0xfffffffe) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 04:56:26 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:26 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaa4c1be8e6adaaaaaaaa0207000000008edd60b4090000303a0002000000000000000000ffffe0000002ff020000000000000000000000000001850090780009290060b680fa0000000000ffffffffffff00000000000000000000a47061669fcdbcf7ae033c99ceba0fb61a380263b8b649f9ee8731e07508676b8b8dd0dbd2c91c85dfda65b773aa22afd4db12617d6d2ca1d21a2cd30e063c2bcb661ecb7af740ae156bb37b67f7f6b54f9a61c1da8f1326f6a58f444f76d4fbc5132942076d054eb8cd43e13473f5cfa90852e8dd1fb0"], 0x0) write$P9_RXATTRWALK(r1, 0x0, 0xffffffffffffff1e) r2 = semget$private(0x0, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000000340)) lstat(0x0, 0x0) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000680)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0x5, 0x487e}) 04:56:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x40000000002) fcntl$dupfd(r0, 0x0, r0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x0, 0x7417}) r2 = dup3(r1, r0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000140)={0x8, "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", 0x1000}, 0xa80) ioctl$TCFLSH(r1, 0x540b, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000001180)=""/150, 0x96}], 0x1) 04:56:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000240)=""/4096) flistxattr(r0, &(0x7f00000001c0)=""/122, 0xffc8) exit(0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000080)) sendfile(r0, r1, 0x0, 0x1) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000000)={r1, 0xfffffffffffffffa}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7fff, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001280)={r2, 0x3c, &(0x7f0000001240)=[@in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e21, 0x2000000000000000, @mcast2, 0x101}, @in={0x2, 0x4e23, @loopback}]}, &(0x7f00000012c0)=0x10) 04:56:27 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4}}]}}, 0x0, 0x32}, 0x20) 04:56:27 executing program 1: msgget$private(0x0, 0x93) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000240)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) r2 = dup2(r0, r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys//slop\xae\xa8\x1a\"\xea\x00+py_tcp\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x001\xa8o@\xa7\xb3+Z\x83\x8b\x13\x0ev\a\x00\x00\x00\x00\x00\x00\x00\x0e\xdd\xb57H\xd5\x16\xca\x17\x17z\xe3I\x04\x8d\r\xda(*\x02\xbc\xc2v\x1c\xcd\xb1\xa6\xa4\xbbDSl\xaa\n)\xe1:\x00\x1c\x10gn\xfa\x90\xcf~\xfaX\xd1[\xd97?O\x81 8a 04 37 84 c0 48 89 54 24 30 0f 85 ec 10 00 00 44 8b 32 44 89 [ 445.378659][T28035] RSP: 0018:ffff888054777560 EFLAGS: 00010247 [ 445.378667][T28035] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000040000 [ 445.378678][T28035] RDX: 0000000000000004 RSI: 0000000000000401 RDI: 0000000000000402 [ 445.398722][ T3879] kobject: 'loop5' (00000000d7a64c69): kobject_uevent_env [ 445.414200][T28035] RBP: ffff888054777690 R08: ffffffff8189537d R09: ffffffff8188fac1 [ 445.414206][T28035] R10: ffff888084a8c700 R11: 0000000000000003 R12: 0000000000000004 [ 445.414211][T28035] R13: 1ffff1101406ed59 R14: dffffc0000000000 R15: 0000000000000000 [ 445.414219][T28035] FS: 00007f00e374d700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 445.414225][T28035] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 445.414230][T28035] CR2: 000000002031e000 CR3: 0000000084aaf000 CR4: 00000000001406e0 [ 445.414239][T28035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 445.414244][T28035] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 445.414248][T28035] Call Trace: [ 445.414275][T28035] ? trace_lock_acquire+0x190/0x190 04:56:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e\x00', 'syz1\x00', 'syz0\x00', 0x0}, 0x120) 04:56:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) 04:56:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 445.414291][T28035] ? btf_array_check_meta+0x2b0/0x2b0 [ 445.422936][ T3879] kobject: 'loop5' (00000000d7a64c69): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 445.428329][T28035] btf_resolve+0x3ed/0xda0 [ 445.428344][T28035] ? btf_sec_info_cmp+0x110/0x110 [ 445.428361][T28035] ? kasan_kmalloc+0x9/0x10 [ 445.544479][T28035] ? __kmalloc_node+0x4d/0x60 [ 445.549156][T28035] btf_new_fd+0x216a/0x37b0 [ 445.553664][T28035] ? __might_fault+0xf9/0x160 [ 445.558342][T28035] ? btf_release+0xd0/0xd0 [ 445.561557][ T3879] kobject: 'loop3' (00000000b20aea60): kobject_uevent_env [ 445.562789][T28035] __do_sys_bpf+0x1212/0xc5d0 [ 445.572259][ T3879] kobject: 'loop3' (00000000b20aea60): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 445.574554][T28035] ? tomoyo_file_ioctl+0x23/0x30 [ 445.574572][T28035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.574587][T28035] ? __bfs+0x550/0x550 [ 445.599840][T28035] ? __lock_acquire+0xcf7/0x1a40 [ 445.604782][T28035] ? __bpf_prog_put_rcu+0x320/0x320 [ 445.609982][T28035] ? __lock_acquire+0xcf7/0x1a40 04:56:28 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x37, 0x0, 0x0, "89dcacc259e4"}}) [ 445.614918][T28035] ? trace_lock_acquire+0x190/0x190 [ 445.620204][T28035] ? kasan_check_read+0x11/0x20 [ 445.625053][T28035] ? do_raw_spin_unlock+0x49/0x260 [ 445.630183][T28035] ? __might_fault+0xf9/0x160 [ 445.634859][T28035] ? kasan_check_read+0x11/0x20 [ 445.637674][ T3879] kobject: 'loop5' (00000000d7a64c69): kobject_uevent_env [ 445.639730][T28035] ? _copy_to_user+0xca/0xf0 [ 445.639742][T28035] ? put_timespec64+0x106/0x150 [ 445.639758][T28035] ? ktime_get_raw+0xf0/0xf0 [ 445.652483][ T3879] kobject: 'loop5' (00000000d7a64c69): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 445.656290][T28035] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 445.656306][T28035] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 445.682322][T28035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 445.687791][T28035] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 445.693509][T28035] ? do_syscall_64+0x1d/0x140 [ 445.698178][T28035] __x64_sys_bpf+0x7a/0x90 [ 445.702574][T28035] do_syscall_64+0xfe/0x140 [ 445.707055][T28035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.712935][T28035] RIP: 0033:0x459519 [ 445.716817][T28035] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.736503][T28035] RSP: 002b:00007f00e374cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 445.744897][T28035] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459519 [ 445.752863][T28035] RDX: 0000000000000020 RSI: 0000000020000200 RDI: 0000000000000012 [ 445.760813][T28035] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 445.768760][T28035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f00e374d6d4 [ 445.776804][T28035] R13: 00000000004bf726 R14: 00000000004d0fe0 R15: 00000000ffffffff [ 445.784754][T28035] Modules linked in: [ 445.794256][ T3879] kobject: 'loop1' (00000000c8f55da9): kobject_uevent_env [ 445.801721][T28035] ---[ end trace ebb638d69484f831 ]--- [ 445.808212][ T3879] kobject: 'loop1' (00000000c8f55da9): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 445.809384][T28035] RIP: 0010:btf_array_resolve+0x1b4/0x18f0 [ 445.827507][T28035] Code: 00 00 00 00 00 fc ff df 42 80 3c 30 00 74 08 48 89 df e8 ff 86 25 00 48 8b 03 48 89 44 24 70 48 8d 50 04 49 89 d7 49 c1 ef 03 <43> 8a 04 37 84 c0 48 89 54 24 30 0f 85 ec 10 00 00 44 8b 32 44 89 [ 445.849707][T28035] RSP: 0018:ffff888054777560 EFLAGS: 00010247 [ 445.855896][T28035] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000040000 [ 445.865171][T28035] RDX: 0000000000000004 RSI: 0000000000000401 RDI: 0000000000000402 [ 445.873752][T28035] RBP: ffff888054777690 R08: ffffffff8189537d R09: ffffffff8188fac1 [ 445.881770][T28035] R10: ffff888084a8c700 R11: 0000000000000003 R12: 0000000000000004 [ 445.890264][T28035] R13: 1ffff1101406ed59 R14: dffffc0000000000 R15: 0000000000000000 [ 445.898306][T28035] FS: 00007f00e374d700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 445.907277][T28035] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 445.913895][T28035] CR2: 00007f900731cdb8 CR3: 0000000084aaf000 CR4: 00000000001406e0 [ 445.922160][T28035] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 445.930174][T28035] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 445.938145][T28035] Kernel panic - not syncing: Fatal exception [ 445.945390][T28035] Kernel Offset: disabled [ 445.949713][T28035] Rebooting in 86400 seconds..