000000240)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000000080)="28bc7f3d02884b36aa88a7c218aa", 0xe}, {&(0x7f00000000c0)="13faa5ceff6759715b11f6fcce985447b9286d795ab6a72b373a5bca0e6e22677bd813843645e47aae70088067b045526d0c04330529aa1363f01d7013d2a5f6d85f3d28", 0x44}, {&(0x7f0000000140)="c01ba3e22a03889a41bd4399e34261b7e80d8132521afce6221b815f4f9f40fb7a407d9a3e275b4d26b6da70aabb88aafc3e74a48d3bfc7b3fcf3d3df7e033740e24725db74cd8ea0c76ad0e7ceebeddcc3a43fbfae1fc2748e2366fd54457475df70a8c7bf173f2217e02ca903accba8d008a7f453ccbeff33a0d4634c1c988e32c2bbd19ead42b80db5a67a06474e87afd37e79de674d28307c8ccc748f57fbd461603c9f1d21eb61027be36129f572731320957e107d7313390a05ce91b22094e018a747fce72f376d73778188f762556cac300c3473df08437dd", 0xdc}], 0x4, 0x0, 0x0, 0x4000000}, 0x4044) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:06 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xffffffeb, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000218, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xffffffe9, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x800, 0x0) getsockopt$inet6_dccp_int(r3, 0x21, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 04:04:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0xf2ffffff, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 212.003839] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000fffffff00000"], 0x1}}, 0x0) 04:04:07 executing program 1: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000700), 0xfffffffffffffea9) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={&(0x7f0000000040), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) r0 = memfd_create(&(0x7f0000000000)='.\x00', 0x2) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000080)="871a5097dc20d3fb053b780b270fe8c36a91652926fb079bd46c") ioctl$int_out(r0, 0x5462, &(0x7f0000000180)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x1, 0x0, &(0x7f0000000740)=""/4096, &(0x7f00000000c0)=""/84, &(0x7f0000002000)=""/4096, 0xf000}) fcntl$getown(r0, 0x9) [ 212.067769] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xffffffeb, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000007fffffff0000"], 0x1}}, 0x0) 04:04:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000a00, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:07 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x8001) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000640)=ANY=[]) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000000c0)=""/245) 04:04:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xffffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000008, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:07 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xfffffff2, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x141000, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000140)={r1, 0x2437, 0x455, "943c084dc2300767ba0007d187a230a63ca4bf1627708f6298e9403bb286e5b985208ea6e007679abd9dfc12782f71c6a7f00625c1c76eb255b276a2de91d09ad0e271d93d75ef57b4418e7af05aa81857e7f0b651367e53a7bfc526c2a86939b383aeb81faf6eab5815f6118f09a6441a9fd27cffd05aa9b3db2626cec7257ccfb4d2bbc7b8bdcec0c0f4c8297b42274cb1bdf580b52a9843556826195b15a6d45fe1f698ce9f8b83d99af131071a986915444dc210dfa394a88eb4c0d335208cc77947ddcce68766cb12d1a765f8905932004f31186de8ac444e3eafd425b5c291691969f2fa9b"}) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x80000000}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x100, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905f15657145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) [ 212.274440] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0xf3ffffff, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000f000000000"], 0x1}}, 0x0) 04:04:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xf3ffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:07 executing program 1: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000700), 0x52) socketpair(0x12, 0x80005, 0xa6, &(0x7f0000000040)={0xffffffffffffffff}) r1 = getpid() r2 = geteuid() getresgid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x400, 0x400400) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000001000)='/dev/urandom\x00', 0x0, 0x0) r7 = socket$vsock_dgram(0x28, 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001080)={0xffffffffffffffff}) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/loop-control\x00', 0x8000, 0x0) r11 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet6(0xa, 0x3, 0x763, &(0x7f0000001100)={0xffffffffffffffff}) r13 = syz_open_dev$sndpcmp(&(0x7f0000001140)='/dev/snd/pcmC#D#p\x00', 0x9, 0x800) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001180)=0x0) r15 = getuid() lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = socket$packet(0x11, 0x3, 0x300) r18 = socket$can_bcm(0x1d, 0x2, 0x2) r19 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001400)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001440)={0xffffffffffffff9c}) r21 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) r22 = syz_open_dev$midi(&(0x7f0000001900)='/dev/midi#\x00', 0x100000001, 0x200) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000001940)={0x1, 0xffffffffffffff9c, 0x930ddd090a7a4c1f}) r24 = syz_open_dev$binder(&(0x7f0000001980)='/dev/binder#\x00', 0x0, 0x802) r25 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000019c0)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000001ac0)=0xe8) getgroups(0x2, &(0x7f0000001b00)=[0x0, 0x0]) r28 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000001b40), 0x800) r29 = socket$inet6_udp(0xa, 0x2, 0x0) r30 = socket$nl_crypto(0x10, 0x3, 0x15) socketpair$inet(0x2, 0x80006, 0xfffffffffffffffb, &(0x7f0000001b80)={0xffffffffffffffff, 0xffffffffffffffff}) r32 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001bc0)='/dev/uinput\x00', 0x802, 0x0) socketpair$inet6(0xa, 0x6, 0x7, &(0x7f0000001c00)={0xffffffffffffffff, 0xffffffffffffffff}) r34 = socket$nl_xfrm(0x10, 0x3, 0x6) r35 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40)=0xffffffffffffffff, 0x4) r36 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000001c80)='syz0\x00', 0x200002, 0x0) r37 = syz_open_dev$evdev(&(0x7f0000001cc0)='/dev/input/event#\x00', 0x7, 0x111080) r38 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f0000001d00)='security\'!lo', 0xffffffffffffff9c}, 0x10) r39 = syz_open_dev$sndmidi(&(0x7f0000001d80)='/dev/snd/midiC#D#\x00', 0x3, 0x26000) r40 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001dc0)='/dev/rtc0\x00', 0x0, 0x0) r41 = syz_open_dev$amidi(&(0x7f0000001e00)='/dev/amidi#\x00', 0x40, 0x14040) r42 = socket$inet_dccp(0x2, 0x6, 0x0) r43 = openat$md(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/md0\x00', 0x400, 0x0) r44 = memfd_create(&(0x7f0000001e80)='eth0posix_acl_accessppp1:-selinuxuser*:bdev\':posix_acl_access\x00', 0x2) r45 = bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0xf, &(0x7f0000001ec0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x46}, @generic={0x1f, 0x8, 0x0, 0x9e}, @ldst={0x0, 0x3, 0x7, 0x8, 0xa, 0xc5b78b96b3079791, 0xffffffffffffffff}, @jmp={0x5, 0xfff, 0xf, 0x5, 0x7, 0xfffffffffffffff8, 0x1}, @ldst={0x3, 0xd63e5d7ad83002d1, 0x6, 0x3, 0xe, 0x4, 0x10}, @jmp={0x5, 0xd5, 0x4, 0x4, 0x1, 0xfffffffffffffffe, 0xfffffffffffffffc}]}, &(0x7f0000001f40)='syzkaller\x00', 0x7, 0xe, &(0x7f0000001f80)=""/14, 0x40f00, 0x1}, 0x48) r46 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r47 = syz_open_dev$adsp(&(0x7f0000002080)='/dev/adsp#\x00', 0x6, 0x800) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000020c0)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002100)={0x0, 0x0}, &(0x7f0000002140)=0xc) r50 = getegid() r51 = fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002180)={0x0, 0x0}, &(0x7f00000021c0)=0xc) getgroups(0x4, &(0x7f0000002200)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) r54 = syz_open_dev$rtc(&(0x7f0000002240)='/dev/rtc#\x00', 0x0, 0x40000) r55 = socket$inet_tcp(0x2, 0x1, 0x0) r56 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002280)='rdma.current\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)={0xffffffffffffffff}) r58 = socket$inet6_udp(0xa, 0x2, 0x0) r59 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r60 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000003740)='/dev/snapshot\x00', 0x0, 0x0) r61 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000003780)='cgroup.type\x00', 0x2, 0x0) r62 = fcntl$getown(0xffffffffffffffff, 0x9) r63 = geteuid() getgroups(0x5, &(0x7f00000037c0)=[0xee01, 0xffffffffffffffff, 0xee01, 0x0, 0xee00]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003b80)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003bc0)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003cc0)=0xe8) r67 = getegid() r68 = dup(0xffffffffffffffff) r69 = getpgid(0xffffffffffffffff) stat(&(0x7f0000003d00)='./file0\x00', &(0x7f0000003d40)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000003dc0)='./file0\x00', &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r72 = socket$nl_generic(0x10, 0x3, 0x10) r73 = timerfd_create(0x0, 0x80000) r74 = socket$kcm(0x29, 0x5, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000004300)={0xffffffffffffffff, 0xffffffffffffffff}) r76 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00)=[{{&(0x7f0000004340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f00000044c0)=[{&(0x7f00000043c0)=""/151, 0x97}, {&(0x7f0000004480)=""/17, 0x11}], 0x2, &(0x7f0000004500)=""/204, 0xcc, 0x1ff}, 0x10001}, {{&(0x7f0000004600)=@in6, 0x80, &(0x7f0000005c40)=[{&(0x7f0000004680)=""/93, 0x5d}, {&(0x7f0000004700)=""/137, 0x89}, {&(0x7f00000047c0)=""/153, 0x99}, {&(0x7f0000004880)=""/4096, 0x1000}, {&(0x7f0000005880)=""/203, 0xcb}, {&(0x7f0000005980)=""/241, 0xf1}, {&(0x7f0000005a80)=""/153, 0x99}, {&(0x7f0000005b40)=""/239, 0xef}], 0x8, &(0x7f0000005c80)=""/95, 0x5f, 0x51c}, 0xdb}, {{&(0x7f0000005d00)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000005d80), 0x0, &(0x7f0000005dc0)=""/31, 0x1f, 0x8b66}, 0x6}], 0x3, 0x10000, &(0x7f0000005e80)={0x0, 0x989680}) r78 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x1) pipe2$9p(&(0x7f0000006000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r80 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000006040)='cgroup.type\x00', 0x2, 0x0) r81 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000006080)='/dev/vga_arbiter\x00', 0x2000, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000060c0)={0xffffffffffffffff}) r83 = socket$nl_xfrm(0x10, 0x3, 0x6) r84 = socket$nl_crypto(0x10, 0x3, 0x15) r85 = syz_open_dev$audion(&(0x7f0000006100)='/dev/audio#\x00', 0x8, 0x404000) r86 = openat$urandom(0xffffffffffffff9c, &(0x7f0000006140)='/dev/urandom\x00', 0x400, 0x0) r87 = syz_open_dev$vcsa(&(0x7f0000006780)='/dev/vcsa#\x00', 0x2, 0x40) r88 = syz_open_dev$adsp(&(0x7f0000000680)='/dev/adsp#\x00', 0x100000000, 0x0) r89 = timerfd_create(0x3, 0x23b2152c28a0283e) r90 = syz_open_dev$sndpcmc(&(0x7f0000006800)='/dev/snd/pcmC#D#c\x00', 0x8, 0x200000) socketpair(0x3, 0x805, 0x7d, &(0x7f0000006840)={0xffffffffffffffff}) r92 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000068c0)={&(0x7f0000006880)='./file0\x00', 0x0, 0x18}, 0x10) r93 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000006900)='/dev/ashmem\x00', 0x400500, 0x0) r94 = syz_open_dev$sndmidi(&(0x7f0000006940)='/dev/snd/midiC#D#\x00', 0x1f, 0x2000) r95 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000006980)={0x28, 0x0, 0x2711}, 0x10, 0x800) r96 = getpid() fstat(0xffffffffffffff9c, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000006a40)={0x0, 0x0, 0x0}, &(0x7f0000006a80)=0xc) r99 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000006ac0), 0x0) r100 = socket$inet_smc(0x2b, 0x1, 0x0) r101 = socket$inet6_udp(0xa, 0x2, 0x0) r102 = openat$dsp(0xffffffffffffff9c, &(0x7f0000006b00)='/dev/dsp\x00', 0x0, 0x0) sendmmsg$unix(r0, &(0x7f0000006bc0)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000100)="8d2c96f27cfab4afc1554f484084680bdb5f98ebdb6448236d7641b39412195ac0f0e2684e98282194daaaa109e15028d8f4f0ee2e680029de2d2fb62837a7b02361f53c9035bdc6b572efd4b73ac27b7b40f7f06325b86139b432c86190eb3c", 0x60}, {&(0x7f0000000180)="e0bf07bb112d6a7d0c8a5e2242c525ffdffbe219adf564d9c1e8eed15cc5a9c2666757eb30598030b7f3783e31b41e3f4de09e420bc015bdcc", 0x39}, {&(0x7f00000001c0)="1fab933a0624688a08daa0e8b49437f1cd2b1dbfb37d43b5c2c52ce7f52014ed2f60987a938d9ed48c39bf39b29da4f9c65fb7c0de3e7f3b4f4a3176479a9a39c95bacc0809b821625d1400a65a7adaf54755c06b42546f030794f33572371ef7d2f47003486d1a1db5d529ac0ea1d46aeac6e00004e76bf9c7f1b68bead581c2588aee0dffd80e2474a5bd2812cdd22acd8c6a8cc858c5487b115732be43db9", 0xa0}, {&(0x7f0000000280)="c5be662dd1247217a4fcfe1aabca8493a78a8f03e082f80fb0db39182baf2cc8f34714ffcd5d07dd32b7035e46c4187c89cefa3f821e9e0f04ee1688c1ba1b24be8c5f96f3b39b21d32e5c8983efcb87a31e740380e0582986a2aee67551018d014b4ad75996919f79d7880b986d527fdd7540a1cebc93ac0ba3dc302afd1a15ea5f4aa0c11a18d4e1", 0x89}, {&(0x7f0000000340)="43cd23228529c535a38c85a1c14aa5cc6b93786fe1fea6783a", 0x19}, {&(0x7f0000000380)="6991453fa98a99132072441ce36aa1d4b5f63c5a85", 0x15}, {&(0x7f00000003c0)="c0f44a507a5ba76ec94b7fd5708cbafbd3378092123308bec5df7d8c64ae77953e9dbf6c16f1c48c3808131bd2ba022d3956374f8425cc9c23d9eaa2c8b9439db289713674928835c81bc77d9cb16edd3ff26af6cb6e2f604892d4acf04db47ef842e520d4218280db36a8d1062a8259b01737a353e000db32a52b4ba9f9b6f259de733c7ab0638e1b47bfa4de98b892a20b44fdb27d4dc45bb3c500015e13b1ba977baa0414b094b59e1edff991829eaf137c0842433b3a7e4ef3d92d09506d28588e9b165600a989cdc01788af668e4d3fe03be93f4682dbc80e39ba4b02329f7fe82feb2b9dfa78b6fa427a5cbfe4", 0xf0}], 0x7, &(0x7f0000001280)=[@cred={0x18, 0x1, 0x2, r1, r2, r3}, @rights={0x34, 0x1, 0x1, [r4, r5, r6, r7, r8, r9, r10, r11, r12, r13]}, @cred={0x18, 0x1, 0x2, r14, r15, r16}, @rights={0x14, 0x1, 0x1, [r17, r18]}], 0x78, 0x10}, {&(0x7f0000001300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000013c0)=[{&(0x7f0000001380)}], 0x1, &(0x7f0000002300)=[@rights={0x24, 0x1, 0x1, [r19, r20, r21, r22, r23, r24]}, @cred={0x18, 0x1, 0x2, r25, r26, r27}, @rights={0x34, 0x1, 0x1, [r28, r29, r30, r31, r32, r33, r34, r35, r36, r37]}, @rights={0x34, 0x1, 0x1, [r38, r39, r40, r41, r42, r43, r44, r45, r46, r47]}, @cred={0x18, 0x1, 0x2, r48, r49, r50}, @cred={0x18, 0x1, 0x2, r51, r52, r53}, @rights={0x24, 0x1, 0x1, [r54, r55, r56, r57, r58, r59]}], 0xf8, 0x8000}, {&(0x7f0000002400)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000003500)=[{&(0x7f0000002480)="b9c3e8e751437ef2b3f2ea6b9821122c643fa23dcbf0caec019587fb08f118c88e654d94f31de23a3407e4e764e12dce51", 0x31}, {&(0x7f00000024c0)="fcedc698882a422d178a942c65c967ac4b7c689a46eca029aa5be5bc", 0x1c}, {&(0x7f0000002500)="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", 0x1000}], 0x3, 0x0, 0x0, 0x8040}, {&(0x7f0000003540)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000003700)=[{&(0x7f00000035c0)}, {&(0x7f0000003600)="3f5f2075cd3d62d79d9286fbb80bb9b19961d5f7762ef9c7a553203fb9bc2fa93c70637d3480e1cb2e38759a8b2a286f798122d42bd69f4243cd3621db516cba39af018c4dad0256c9bd3d2aa857cccc7b07676c5032b27a5bf29394f32e7365b6d11895b79a497c714f74df990169cec8813757f1c0547314a6117941c57e93805720f44fdec013a02e0446f47b52f80dafbafc89f919dbb37a813aed53dd2beda80cac879239df2239f0a0159f35d0a6f9d0b68f68cb2907d9be933fa3f39afd1e945bf24b1358206b8c1e70dc4e60b9c8064ff385946e5c59d3ced2252d469432867f6e2d", 0xe6}], 0x2, &(0x7f0000003800)=[@rights={0x14, 0x1, 0x1, [r60, r61]}, @cred={0x18, 0x1, 0x2, r62, r63, r64}], 0x2c, 0x20000001}, {&(0x7f0000003840)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003b40)=[{&(0x7f00000038c0)="e0fc170ff6a0f7492239e190133f02891ba6efae06d8e1eda7b849a928b741f4ca71e79a0bfa1bdf198b8f7b754ec268bd6f0241a29263d046713dcb74788b85022d6e9ea9402e97afe837a68123bf956dc83a83211633cdb2f827c2efd123f2c388f1233350d3784a951e2d9b5db8d169cfb7f3d9842d34ccd604f4d775b4123b3c089039682eb0ed1c285ea254db4cbc9ad1f2a76bd0c5bb1710512433", 0x9e}, {&(0x7f0000003980)="62af1030d341a1579a9d9f544ed8a5bf9f2d36e736dd4051788e1413ed45421ee136e04111c5516bc6afffe16075a686e2b0d726d445fc70ea6beb0caa0aace0a792dded0a18740016c4ae51a1b96a4853572a942b629f8c6680aee1f826e24ce53be3829476bde8ccea9f9b4d3c4b41a84474e9a10f2cbbce717d409f0753d403648910e7669dcf3e307d739440eb8b21042422fd33781bd7", 0x99}, {&(0x7f0000003a40)="ee9bea1c00ca950d95c79e4b6e89f80a9ea16cefb97ecad3c2bfe9f9ebc65825a70aff573f7639f673f8bca15ef52272a8e5c3fcfa9105ccbf59552c24e404cfce2e27ab66d3c0997431032c840199510b5c44c6e6c5b598fb24ce5b5d2453d2fa77370b7595380b21668604d12f8adf92887b243cedd5c3b7424d8366d52e1ef77543278380b2cd65ec7dd2bba4709cc3cdeacf3c38bde95ac24bb3a448f29ca7ed0dfd39bfc1d21116745a9ba6bb12e4dd609a15acd19ab6ab9e5817f4b1c1cde6fcabb65cab77952049", 0xcb}], 0x3, &(0x7f0000003e80)=[@cred={0x18, 0x1, 0x2, r65, r66, r67}, @rights={0x10, 0x1, 0x1, [r68]}, @cred={0x18, 0x1, 0x2, r69, r70, r71}], 0x40, 0x4000000}, {&(0x7f0000003ec0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000042c0)=[{&(0x7f0000003f40)="0238bf12909bb9500acfb696d9c962b6321c25a8e938e70c8872e665e8fd4bd9a948163ecb9b6026b7c76c799fd7ba753546b07380441cf19069d6d6013c0794d473f63e64c683e7c9c8143454413c53650a455bf9541d37cc793ed0bb2d379a53b7ca564ccf63ac6de8c5dff8f70815c5cefcf35bb9542e14915338a6a7e919b29f91a865733982fd0b78414e23c2", 0x8f}, {&(0x7f0000004000)="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", 0xfc}, {&(0x7f0000004100)="169eb338e2b4c1b8ff69c2c0103c73f11d4e20f4936bc877073feff2dfb31a0180b869a0924894b23d96e8d1877444ba7bb3ca21d38a7c52cd0e3dfdb1f87f2c461b40bba6b3a8128b679eb9871b57f5b64c17022ebce2ed4500134ffc0bb6f2dc272eedc16ca3b2c1edb72703047ff1e745824fa59c50be1ff7a860fa1fdb71d39b02c967c40d56c6a99f340ca98cc4db888de1a230cfaa837eb42cbd680e9120d20eba35c014b2ee11", 0xaa}, {&(0x7f00000041c0)="1ee62f5deb08c900994e89643c771001c8301b38a7df30505b01c28e2a727b0ecbfe5458dc8bc270fc9c96563c4257de6cb15aca5d5165d44ca3ea10dce65da99b338f8d93210f88a5d95f584a2613788d6958c6817aeb1e5310de7b71686bbe5228b46b7f8994f29ca837a881c77df7155279", 0x73}, {&(0x7f0000004240)="28947ceee888ff43817dbfad0cebb4553783c0ed61ab4020255bc8c97f7c5a804ab0be7d8ddfab675e6275a359e199dee5ace9201aed2b0f97dfdf08aadd48f1570d88536eb8ab47ffd4a50376889d2cf3dae5f9f785fc", 0x57}], 0x5, &(0x7f0000005ec0)=[@rights={0x24, 0x1, 0x1, [r72, r73, r74, r75, r76, r77]}], 0x24, 0x20008010}, {&(0x7f0000005f00)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000005fc0)=[{&(0x7f0000005f80)="2b758b578ec066806f40176ccc674e2a1b02086f", 0x14}], 0x1, &(0x7f0000006180)=[@rights={0x30, 0x1, 0x1, [r78, r79, r80, r81, r82, r83, r84, r85, r86]}], 0x30, 0x24004001}, {&(0x7f00000061c0)=@file={0xaa6f661e677b12b1, './file0\x00'}, 0x6e, &(0x7f00000062c0)=[{&(0x7f0000006240)="2d8ea9c292958f3ae96e2c7880b1fccea1d20710eab8678e3374d5d9574ed94da64da10d9f5c7bcf7c21ab6280a9ee495eb771bd971260a4ba832cc7c1483f43022339aadb756c7ea4c7625ea26ed99035ba18e2c35852f5b9986105d56273744283c074afee40f391d0f16c", 0x6c}], 0x1, 0x0, 0x0, 0x20000040}, {&(0x7f0000006300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006740)=[{&(0x7f0000006380)="abbc4a1914c8d288d23643dcdbb44fc88280017b33f2c569f2231a25bad430631c6b87de1c6843fe6a8ae7db334c7e74df93314ef13166f817eca1a8c61749f3d9ff6b58d7a26a0319e2d430cfe692ef88e5bc27b59a1f783f32fb98a157bfe14c2b8048718d5f82e048ab0e0277d7e68382cc84ba38d58a", 0x78}, {&(0x7f0000006400)="12ca6d429541f3232a8e3a897b1c294168f69fc044d3cd3fda5682ced9cfc9e8ee5d58b966c8acc3316f795b807e6e6e4c2d0be7150db4be0337fa679478b1a47f3c837a596a9cb98d3242b81663b8bc6cb8641b422059ba9b2d393a871fe6678de995efa29448389d852f457896934c9f94469e4cd46e247b551803c3bc7e36f74f0aa93d0484589d0162d5c9858309c14be74dd50692fd3ee0999ab1c04618b1e3244c2badb40c6b9ae58eb5901ae31eb4e2aa", 0xb4}, {&(0x7f00000064c0)="c3c67805548617484c7671cf1f60dd79458b42526dcba502df06422506aca1322f38df7316ad868ff4819fa24f3a7d0a2703805f63bb50cb836424a0adcdcd4b39dbece7c9e0cd77efadb0fa381d7adf56607860545c137fd41d0e77b996bf444777ae290e2cc67793b0", 0x6a}, {&(0x7f0000006540)="f801b608806c509b16a2c3e5b7e9fcdcc47484175ed6e0adf080ca", 0x1b}, {&(0x7f0000006580)="be1e9b4f86eb0e4546dc93d5dc3a800d84fc7059fe175501af052e255f9dd64eefae201082934b77ef4f085bc8e44ab27cf7c8d2041b1b15f9356b26024d88814bb42dc8ba74262bbdfdc9fc65a5d05cdab1c6cb2c549f842e47e75f1a46861d966a65066a7a9cc7da3d81e3bcd45b9bbb842f88ecae894f23e5fcd0a0a697537336136e7b0c0c3f253aec48d8478bf73ab76461ef524afca31894a45b509d1c7b21551073254cef7a51f33ce83559c6385e7b569f03008a287eb3522924", 0xbe}, {&(0x7f0000006640)="9e89df75dd30e9b6c1b908500cdf3801d688e347b791597388ae6a91bb542b6b76c6d58f028a9944b2d086cc782fdf5a68e045018bf13fed3c940636351b0217b2819e348456d143de1e513a4f03aba86acc2012276c6e9011cb96cbaa678e351f4e69b3ee400a782b3e3fb8a07cc618b6e54de15456618a5146d1d63597ae32a1da508139ccc7de4669aec7a780bcf7cd79c014ddc829e42ff4f73090de5674dc1635412596f1591260899f767eff438a4ece81488bd357630877bc6adbbbc329a41a1e2a81f7c2eca9144148363ae4f2077cb2ba4f7b30bb7b52ef0b94c5c2ee8ac20d9ff4d7a29aa57b6a6de1d4", 0xef}], 0x6, &(0x7f0000006b40)=[@rights={0x30, 0x1, 0x1, [r87, r88, r89, r90, r91, r92, r93, r94, r95]}, @cred={0x18, 0x1, 0x2, r96, r97, r98}, @rights={0x18, 0x1, 0x1, [r99, r100, r101]}, @rights={0x10, 0x1, 0x1, [r102]}], 0x70, 0x4000840}], 0x9, 0x4000001) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000900, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) [ 212.430732] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 212.439732] Unknown ioctl 1074021064 04:04:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0xffffffeb, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000f0ffffff0000"], 0x1}}, 0x0) [ 212.494660] Unknown ioctl 1074021064 04:04:07 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xebffffff00000000, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xf2ffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 212.562044] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c200cc00ffffffffffff8100000008004500001c00000000000090fffffffeee00000000089078"], &(0x7f0000000380)) creat(&(0x7f0000000080)='./file0\x00', 0x51) 04:04:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x2000ff00, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20001802, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000f0ffffffff"], 0x1}}, 0x0) 04:04:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xf3ffffff, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xffffffeb, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:07 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) r1 = open(&(0x7f0000000040)='./file0\x00', 0x20600, 0xc) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e22, @local}, {0x2, 0x4e20, @broadcast}, 0x4, 0xfff, 0x4, 0xf6a1, 0x2, 0x0, 0x0, 0x2, 0x2}) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0xfffffffffffffe8e, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) [ 212.796007] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 212.832701] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000ffffffffffff"], 0x1}}, 0x0) 04:04:07 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000ffffffffffbf8100000008004500001c000000000000905b15677145f0755a0a78ff000000000000000000000000089078c75330c2d432af6ea7b8e94f88341624977aeece841a26963497cba24a0ee87caafc6ed034d9b46792fba2365caa15cfd3fef9cb7efa8ee4509e8c5609d79ca00f62e27fca12737f506b416ad47c7433271912d1896f645cd30c44c73ca2cb8440aa0248fd9ad363"], &(0x7f0000000380)) 04:04:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20004900, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:08 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xf2ffffff00000000, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x200001f4, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:08 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xebffffff, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:08 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) 04:04:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xf3ffffff00000000, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 213.051752] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:08 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xf2ffffff, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 213.127049] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:08 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) 04:04:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x800000000002, 0x300) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x1ff) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2000, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x3d, &(0x7f00000000c0)=""/189, &(0x7f0000000180)=0xbd) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) getuid() syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], &(0x7f0000000380)) 04:04:08 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000007fff"], 0x1}}, 0x0) 04:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000007, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x1000000, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xf2ffffff, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:08 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xfffffff3, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xebffffff00000000, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:08 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000100)={[{0x0, 0xec14, 0x8, 0x6c, 0x2, 0xdbc, 0x1, 0x7, 0x1, 0x2, 0xffffffffffff8001, 0x1, 0xffffffff}, {0x0, 0xa42e, 0x100000001, 0x0, 0x4, 0x4a, 0x100000000, 0x7fffffff, 0x401, 0x3b96, 0x9, 0x8, 0x1ff}, {0x2, 0x0, 0x0, 0x4, 0x0, 0x8, 0x8, 0x2, 0x9, 0x3, 0x8, 0x3ff, 0x7}]}) r2 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) r3 = syz_open_dev$sndpcmp(&(0x7f0000001ac0)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x208000) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000001b00)={0x1}, 0x2) setsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000180)=0x1f, 0x4) fadvise64(r0, 0x0, 0x68c, 0x1) 04:04:08 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000f00000000000"], 0x1}}, 0x0) 04:04:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x21000000, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x10d001, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000600)) r2 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x21000000, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:08 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="f7ccec5c5fc7e09e29341731d9aa01b3820ffd3f0b5d1155c65f522fff15875fc5e1541dc3acf3a91d208911fa5cb24ae8c80bf5a0f66c3c29f1461746e60473fb49240e65e058c58dfa43cfc215faf05001ceb50699bc1a15ec1fb1b3efb81a7d09962b4b95e8d74b1e50453dcddba986d2275b9e7297a45511772117401921c87ba5112f11722c8e46f97e41d5637a01b1c3084a229b1d7ee2e357dad21f9addda9e7c8873826af5891d54d59f79fbebfde799537738ed7843bb0645ee71c1bcf896369275332819a2c93b667e093838c93bf0a5d6b2edd3c8291ccffc5c91a5db65f77c79e429ffe461d3e95196205cf2015d", 0xf4, 0xfffffffffffffff8) r2 = add_key(&(0x7f00000001c0)='big_key\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)="fbdff96b341a5e8ff09c198452b1e9e0d395c512c2642c637268c0cbd94ec956bcfb5195165a454267d1d3031a01", 0x2e, 0xfffffffffffffff8) r3 = add_key(&(0x7f0000000280)='cifs.spnego\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)="114a225c770e7d138c8c4739f3d2e8c19c9a7f8fda6f6b9f221518e27d6dbf59cdb2f09f8a506d763924a52af525b2efa121bd419f84", 0x36, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000340)={r1, r2, r3}, &(0x7f0000000380)=""/144, 0x90, &(0x7f0000000500)={&(0x7f0000000440)={'wp256\x00'}, &(0x7f0000000480)="861f3dc3dd42d63a27d3957ef61ead8552e1414031916b8a8e2aa3eaeb8b37a09eb60a105513802e41e096c01fc773175e359d033d9457ae6280f9523061a9643b2f1360c566e29166735d01c38c", 0x4e}) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xfffffff2, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xffffffff00000000, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 213.382749] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 213.563312] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 213.588605] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:08 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000010000"], 0x1}}, 0x0) 04:04:08 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xf3ffffff00000000, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000007, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:08 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9, 0x101000) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0xff, 0x1, {"6609abc1e83221778b164f9704f9fe9f"}, 0x4, 0x20, 0x80}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) 04:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x41000000, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xfffffff3, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:08 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000020000"], 0x1}}, 0x0) 04:04:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', '\x00'}, &(0x7f0000000100)=""/128, 0x80) 04:04:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000002, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:08 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x800) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000080)="1688cf200aa9c86e089e2c1052085219af36b7b98e765bc6cccb6603b34116959f9803cf6572af878f78d44a7a6b8a4754b10428818223f4a2021e5a1736091935eb282e986fe749b97e38427750c5dc963c05b1f84d2a664e9672c3501c25e6b9aea13290eeb7d9c65cac3c4956cdb571d3") [ 213.815094] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xe9ffffff, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:09 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xe9ffffff00000000, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xe9ffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20005100, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) [ 213.975354] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000fffff0000000"], 0x1}}, 0x0) 04:04:09 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x101182) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) sendmsg$can_raw(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1d, r2}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)=@canfd={{0x0, 0x0, 0x0, 0x7}, 0x40, 0x1, 0x0, 0x0, "db9c9cf2b53f8ec257d89a88af051900784a5dd061228a9e92578dbddc3dd4da8bfb5dde0a1f87cfce35ee45150424b3e9e341c5e038e9379efd1965a82c6740"}, 0x48}}, 0x20000000) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$packet_buf(r1, 0x107, 0x6, &(0x7f00000000c0)="ea5c29531b4fcb11d60ad385f0d33bed03c1f4e0775b0604c2eaf44362adda4b2bc08556b692262d5802e938b3ec09e1f16a0920054bdfdf2ee9d4420c29fffdd21b7ffd35961226ed7447", 0x4b) r3 = dup(r0) write$P9_RRENAME(r3, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000049, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:09 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xffffffff00000000, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 214.132249] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xfffffff2, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000ffff"], 0x1}}, 0x0) 04:04:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xebffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:09 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2, 0x0) recvfrom$unix(r1, &(0x7f0000000740)=""/4096, 0x1000, 0x0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) [ 214.218149] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x2000ff0f, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) time(&(0x7f0000000100)) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x2000c0fe, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:09 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0xf3ffffff, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:09 executing program 1: r0 = memfd_create(&(0x7f0000000300)='cgroup.subtree_control\x00', 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', r0}, 0x10) socketpair$inet6(0xa, 0x80000, 0x9b6, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r2, 0x3}, &(0x7f0000000280)=0x8) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000700), 0x52) sendmsg$can_raw(r3, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000000040)=@can={{0x0, 0x3, 0x1, 0xfcd}, 0x7, 0x3, 0x0, 0x0, "645c460a807b6a22"}, 0x10}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0x9, 0x141002) ioctl$ASHMEM_GET_PIN_STATUS(r4, 0x7709, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x3) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_subtree(r6, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) 04:04:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0xe9ffffff, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xfffffff3, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 214.429698] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000f0ffff0000"], 0x1}}, 0x0) [ 214.511639] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000004, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:09 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000040), 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2080, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x0) r3 = getpgid(0xffffffffffffffff) mq_notify(r2, &(0x7f00000000c0)={0x0, 0x32, 0x0, @tid=r3}) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r4, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xffffffe9, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000500, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xf3ffffff00000000, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000ffffff9e0000"], 0x1}}, 0x0) [ 214.757003] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 214.765236] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:09 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 04:04:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xebffffff, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xe9ffffff00000000, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000020000000000"], 0x1}}, 0x0) 04:04:09 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xf2ffffff00000000, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000240, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x10d001, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000600)) r2 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000003, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:10 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xf3ffffff, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:10 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) socket$nl_route(0x10, 0x3, 0x0) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) [ 214.993576] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xe9ffffff, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:10 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xe9ffffff, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000009effffff0000"], 0x1}}, 0x0) [ 215.067190] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000600, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:10 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) flistxattr(r0, &(0x7f0000000040)=""/250, 0xfa) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000000140)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x100) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000200)={0x1, 0x8000, 0x20, 0x80000001, 0x6, 0x6, 0x80000000, 0xfffffffffffffffb, 0x4, 0x7, 0x0, 0xcf6}) 04:04:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000051, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000ffff"], 0x1}}, 0x0) 04:04:10 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xebffffff, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:10 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)="f7ccec5c5fc7e09e29341731d9aa01b3820ffd3f0b5d1155c65f522fff15875fc5e1541dc3acf3a91d208911fa5cb24ae8c80bf5a0f66c3c29f1461746e60473fb49240e65e058c58dfa43cfc215faf05001ceb50699bc1a15ec1fb1b3efb81a7d09962b4b95e8d74b1e50453dcddba986d2275b9e7297a45511772117401921c87ba5112f11722c8e46f97e41d5637a01b1c3084a229b1d7ee2e357dad21f9addda9e7c8873826af5891d54d59f79fbebfde799537738ed7843bb0645ee71c1bcf896369275332819a2c93b667e093838c93bf0a5d6b2edd3c8291ccffc5c91a5db65f77c79e429ffe461d3e95196205cf2015d", 0xf4, 0xfffffffffffffff8) r2 = add_key(&(0x7f00000001c0)='big_key\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000240)="fbdff96b341a5e8ff09c198452b1e9e0d395c512c2642c637268c0cbd94ec956bcfb5195165a454267d1d3031a01", 0x2e, 0xfffffffffffffff8) r3 = add_key(&(0x7f0000000280)='cifs.spnego\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000300)="114a225c770e7d138c8c4739f3d2e8c19c9a7f8fda6f6b9f221518e27d6dbf59cdb2f09f8a506d763924a52af525b2efa121bd419f84", 0x36, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000340)={r1, r2, r3}, &(0x7f0000000380)=""/144, 0x90, &(0x7f0000000500)={&(0x7f0000000440)={'wp256\x00'}, &(0x7f0000000480)="861f3dc3dd42d63a27d3957ef61ead8552e1414031916b8a8e2aa3eaeb8b37a09eb60a105513802e41e096c01fc773175e359d033d9457ae6280f9523061a9643b2f1360c566e29166735d01c38c", 0x4e}) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xebffffff, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 215.221740] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:10 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xe9ffffff00000000, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:10 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000200)={'nat\x00', 0x0, 0x3, 0xe3, [], 0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/227}, &(0x7f0000000280)=0x50) [ 215.333887] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xfffffff2, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:10 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0xffffffe9, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000007fffffff00"], 0x1}}, 0x0) 04:04:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x2000ff00, &(0x7f000072e000)={0xa, 0x2, 0x0, @loopback}, 0x1c) 04:04:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0x2, 0x2, 0x0, @loopback}, 0x1c) 04:04:10 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff}) open_by_handle_at(r1, &(0x7f0000000080)={0x1008, 0x8, "952b585e792ccb64b36fdddd8018f74fd1fd4c2517a35dcc9ce3fe5d040fa007cd71b80a4713b6b2c3197dba71bb042ec026e7c1ffb197b0ec3d0cb42292b0249a5b82244f1cf1ac374d1b98cc1fa08c2e23e894c6a700bdac1168ea710520bd55feccc1fa01d4da4e73c84ef1742feac29d038c669c75bab02ebb5dbbd8934c53b5cfe56749eaf1516afd7874817ff1c6510f5e2e1303b7457c1657c5bc13f59f2d3a21d5ccf586c606bf72189100db867594c3a264117ce77282c075713dd7defa4ed140e4e8cab2e3b8865b9156c4cf2791804fb188ce64a3f0f0866836507f73c046058e7cc42b29b0bc82921c3d7a1a76056bb72d13cac2715b328a6d9dade985745aeb45c113ec2d38bcaee13f5068bb6e7335e26fb0394e5b6f1e18441b0c7840f677c14c1c5e321d3160830ce5f71ab21966a74be530c5ecb497d23d47964902e80f600710e36a8089d67a3d336067806aa60d5f4e5a6a5a15e53518043060bfe483c2c52fa14593473d92d40789c7e999866798fb8feeaff99c20547ed1a564e95495c2e6e84aca00cbfe1232db12379784bedf334fad6e12e7af2a8efd46553b612182c7a12f3f3bae3787c6034931d6274b9a1925b21e9edea0b5fbd216500073dda13a2bc9b2265a84b354d8d8f921e038438f5e11938e3f773e0102ec789fb7f17c21e22af379dcc5be1e0246a49cf2f47761c5b41228f6f2e8fadd44f349c27d32956d910f7f7c862b8e34bbb71e97613b53daefadfcacbd5a72807037acb68a07fa4479ac1144346957c4de303878d02d65d36f18aec80c139eaada714e5a152b98f064cd08eb063f4317de3fd33b52ecb6a409211f9e110f698bbfe0ac350bc1ce2c37eb720c3506165055786242505fa82eff4aa3e8455f45bf930efc4f382ab2784a5f6afecbe17a6592a415800581fff29d6c5cb1f0986db40061548830f62d4ee7798db274dd4d76910cfc3b1fcd93308ba1445b6b8d8593c44433ab019a0ee173a493cec86353ff5e7ced762e8ecff688848abaa6d86824bd3f420bd28aad8dd686140d303d8f10601a8ba36e36f9383aefb08cd264ec58241b709178ba7e2037cca329d1785e8ea1e7575b3f65a5172e0780bd546426dd05fb9c0761141f0b604a3e52718d820401c0e83584efaaea35ff144794b3dc170be3bfb53dfc571690f2aacb06862e14af46297c6ee0ee094b96577688b429c98c392a18fd65d8e4ddc6cf00de617725f932168ea5bbfb1d87a70a8b5150138f904bef248e6dbedb4c30ab26f42a576072ac74a39b1e5b7865fff63d3b1277c4677bb4768716646a732643d6ef23f9d4346b0862e77f5097a9fd5fc2cb780dae367690bf004e6fd9c3d3ded62f72164d7c5dcb9a44fc2afc906d41b3224734f86348d18238147619c0894f88ccd8b47a5b55c301eb05d95bfbe96dc438bf3ad6659b7cac2636d82877759ee8149968368afb43bc2c91df313fd6ab44decd4a74dfa15a34fc79906eca55610570a93cfed626dcd54bf072309fef8ab591738f6e7ca078d9b1a6d2d5deaedcd906b2b623bba7d5b32c9ec10b28b8e89cb301647307f908a7ae044e7f18cb13dda217e8e480aad08c545140c891d9738d5b50e2e75ca5e8a0969f0074c998eb3ef4a814f2c0c9c4c051f4402ef3fbf9b83a93d532d1c1078acf330ebf456deafc7c7e2a56043ab706623eba6e8b92c554e659aeb8b5e1a11323b6ab88831c0994c9e1c9632698b8e01ea97d6e2366bb24367532aa5b79ad04c5f774755bfb6b0c959dacc79c79c9d603380714861c3b3f21398cb5dcafdef4f71854c1d5889be2a18536cce262d79b7aba6663cabbd109769a2c2c7bbda745573a7353d5d3a474a731cca9f1cc1788c2cc6f19f3540f07ded9cdfa3d1932ae5ff97d49b7b3fdbaf22083f0890744e610aade0dc58f3bae3ef20bdb3f2c384e6eabbff9d8cbe2ba151190055a5e54470c541c7c8698886742c8f5eee01cb231a0735da013cf2ce41bdd54e3a844da6d90418a3574dde07ff2d1c01fd67f7e01bca90bd0209dc6ff3e69a78478fa3d766abd3d5a569de473b0a648b6902e53b46c3b2297345b93a3b65d7ea8eacb6f46cf1ed4332f8da75ae5dd715aaf15bc474ddd84ca9ece8db04f8dd5a456cf1d4922206fd9745238a71f0d61144351ef50ec68a27a3bc9f32a631a0ec121e411c57348b0fdbf354b675baf336c427221d7eae9932937a892017c8de7a98a4657ec41813703c11787c6bbdc292ff2c24e509d39e62fa343dddbdf9353294f011a1db4395578322478357a2df7e98c05b46a1de8d3568263784f47a62895d782e965df4edcffcf8310c0885f866fa7b59350c19dc2e6d1e89df9107ec7cc15bdf1fd2213a4fc8f9d84bd58ab4cd184201e8c14621669e351b7e632a8f47bc7ab33aba07db53389093a7a01a3dcaf7e80a2ec7ab83d5525697b868b998ac96160baa705ac03b470a8e9eef49845da4ed36c05e6cf939dcb1bcb9c03facf312374d60e3c8e0c77c59786c84324bfa7665e59ec7c30e0b5475f4fb5264963654ffa58528fa7d62e0d011eda8312d3c3a2c2f8357c1fd03319c8c9154924125a04fa5240816758b690f3cdc976ae374222374a1de3b6f693ff2d231c6367a4c6a9bb995189a44e6c4cde83fe156b4830d92ef5123508fb2a01ce0719bab0f9d94b63a12e24834b9d11546deee974d2a4527ec740a052a1b2d274f8b7f15409773bbf3d561d31b7b63ae1ef7bd2de7905e5476c51f7a05d5bb08c5877dedb9bd6d8c8072e37f26fdbf91ffff5d83e8434a800f9a15660778dff6bc44f8c92a8360ed2c8ae409634c4eeaed1bd4f80876be514925b1b634c16839c8c04cc497bee1f2941fd477104077bab9bbd6dc31aa5b1a27592b8475f2c158c97c531eba838a2a3d4c4a9ba8a36532cd3005c6e00f394a2aec48db23f0b89a0a5d43702babd8f1109c853515200c0c123aff2ba7fc270c142a01e0531f7851ea41c574c538e123f806c3e53906be538d44229c57ce718990c86b92c1f89364008e619232c6915ebf4695ae606ba5f4d3562c9ee1c3b4c6d3b8b18b8ad8346a455e97cd01d5deaaa6a09c2d75663c95a3ab3941b84fb3a890fdb8f03615af917bcce0e2607c906ff65208a4c188f8028c1d2a5d5c527dc8c3324160b49f23f716f479b01d35bb69165d9f0335f46110f2c4caf12014feba1238a4c037c06ac8ca8e23c164c9c28d712b46ebf5fdbb4085ae5af191a000e3eb5555f5ddbe8583292cd66623fe151e54e16106d7be836500699680e9a27b9448f4f7ce610b0a0cfb35e99e63762544e4ab4719166afb3738f996c7ddc0891fc17f098e7ee1e1b8c5d27a9c2eba23646cf7e2e2a7df78e0ce7e74017f3baed6b2bfd9c1e09d8cb34eefa8c8d2bcbe270eb9b2e905a2d8a541a8cf8ece7cf2c0e2070882a19208229637e86dc4821369eadbcf3706e3e77136dcc98b313409434c84ebfb96a5690ec769e1b38e12db6d3db9980de6fae387c16d23a5757e1f7fc129b2986761a5e87427b829eae118b7dbb57a862a85a46ac5f58bc6ea626da7ed2052c92e532ba0ac71da0b98a3d0e29f740bb03b9b7e79b087bc0b51b31e394290954cb1b10670c7f38c14beff3c8166ded48cf39d40858286b0cea96e8e14b87a47687fb7a54faa0922b1144a8f981f2cfe5b1abfe5e718c03de21521d76e6aa6518bea8e94c40775be3e86bfc31d2f95e619dee6acab64acaeac3689d45acd888c68d57938326d119d3e94f955dc12fd5b827555c049e354a698d80bf6d9135794d6d9ce4ce3028528eb2aa76e136d674c1da2ad9e1a6d85538059eb8e2783ecbc22467f45d1b2fc418ec42257f15a006a250244f8e652fa0649720fac7c25a94c5a067a5ef41632ff567c16ccceb656c813040d66893e90b6a9fdafa7ec608d30f56e6efff9c95db29d9cb90d1458794dc83f5ae8cf5bd5b3825b4c4c71e0587431d5db2cea46917a1c87e223148b5b4556d5b9b3829de250d8673cb80fb3b84f891c1784577a0c36ddf454d7a462577d8d6ce0d8a80474fa42d60304a1c0c3ed362b7578b0654c9192bbd7af5889b182577995cf2a6252774fee87a3ae72758bc3c85479d5c84b02d2aa4b98293c2e8f541768de389c03a276d1008d9ed10acbcc8d7f52bb8fcce31a0efd50eb846a60bb41d4f575dc995d06bbb3b72f9266e5bb0f846653ecd821824a8d5ffb2f76df63f1cf600440370dc0ca62f90ab133d25ab28ef847c60bc2d8f62026ab25e88251fcdf2fa0ace5b1cdc36ee7aed5bed979a50c300cb1270e7b3c010992b83fc447e955d036d682e8f3c1a60c59993474d47d9869b0394d9941a526b98a2b78565b3cb962ee477a46ef9a9751e43e3de3acc88b9227ba561c3bc97fe493b53e3e6a0ec0824a4d05c3213061fcb4c4c5209bd088917519ee8092e6b6f5a425cc8428c199ff29381147f355ca10f1e91f0e44087016971dfe77364f1b190a7d46f27f6108ea0c5c7909ac312860509383870f1bcca88841beb4b6c16098accbdf65d67c73667b8bbdbef83be66bbb81e5e64b39d6990cfb9ad7e3b67ed0e6b58880b4a1bc2fdaf09b84580c2ed81d73abdfa4dd39f1dd25ed6592ba104f1c081cc657a082d8eb9c6ca49ae4fd0939f2cacf5c1049b22225c5d0ec753172451621dc7c2733269d9214b75866ca389d8f74520ab73f2793232801ad2619a7665a03698729668eccba3f971b514192ef2377d25cd58bbd891146c0b3065766083b0640f7aa3f04d0c860f009eb715c4520f623acd90eba4ba80f936fda3d76553e129d5fe6c957fd5add70dbdf3328e5fcaa0e5a03ee7445caa23ddfd588eeac4d2e75e40dcc02a4896ed6de63071adcb2bcd01e96e560540893470e0118ccc2a81100e3efe464bcfd4c019ac9d6126960b905815be523dbb82d506adfdb3ef57d143d5fe109010b6f62eab67b5a2d435c414c49191b81e816037e2ea3a448143c030ff70dbb728dd0d864469337bf1026c3d943c7034e58a88f76a39835d89d945376012115bf9ecb82cc8c903c5104bbfbdcec008d970375b39701e5b6b558045ed843da274377ca30e8cc001f2458aa3c5e1c0621be54c87d188d4b87fcc8c7b5c9cf3c053c5a6ed3149421ee064bc7147fe5f3da3bb5f7c6ec3c1ae5141474e53e1cf2b93590ce91036505e6871f89b2f70af85079913af42f25f298bd546e43053b1366dccbc00191d877376d2cea30cb3e6faff3bcfa95aaa05e479ac00af126eedf293fad69cbb477700dcd8197c8ace17c71698e9b7ddef841cf7a4835e4d1c72b5b1e6bfd0010b634e0cd28147b6845d007901f09d69929c18464aa9a5ec0ad51f327ee612fbfaf4703f4eb97c3022bb3b633b44c959f25b73bd48aef8caa55c73d7eda166787b29a03f16a737aaebfe7ca12ab29a366830b7113168d3cb08e98305887aefa1ba320cdc43903e403b58dcbf469552fc392ec5f3b3c7560840eaeef0d5ac16d17fd8a44c1ef939711ea18fe3752204fbf89c594331c6da39097291a77dddabf2f42f643829398d6fff54c1a4c68b8d03e298ead4ce112e33a1071871d33c0c20f80779577e0dc30afeac6c0fffe1290c4982fed4fa8233b28757d7470bc2dfaaf8611aa9cbbc63eae0fed9964e7bd0d3b9ea4e6530ba4252893aad46ec46c0c49be2b7ab566e2343ed5b5afa0d91e3adff63f238d1a568a6f6601e2bc198dd0b50c20ec6117676a6d6792b2572081a83db0c803d6acfc98b6f200287330f04e3068f"}, 0x9e601) 04:04:10 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0xf2ffffff, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 215.529225] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xffffffe9, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:10 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xf2ffffff, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:10 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xf2ffffff00000000, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000f0ffffff"], 0x1}}, 0x0) 04:04:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xc, 0x2, 0x0, @loopback}, 0x1c) 04:04:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0x2, 0x2, 0x0, @loopback}, 0x1c) 04:04:10 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x581100, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:10 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xf3ffffff, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xf2ffffff00000000, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:10 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0xf2ffffff, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000009effffff00"], 0x1}}, 0x0) 04:04:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xc, 0x2, 0x0, @loopback}, 0x1c) 04:04:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xe, 0x2, 0x0, @loopback}, 0x1c) 04:04:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = open(&(0x7f0000000580)='./file0\x00', 0x1, 0x85) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f00000005c0)={{0xa, 0x4e20, 0x5, @empty, 0x7ff}, {0xa, 0x4e20, 0x400, @mcast2, 0x1ff}, 0x0, [0x9, 0x800, 0x0, 0x4, 0x10001, 0x5, 0x9, 0xfffffffffffffff8]}, 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={'lo\x00'}) r4 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) sendto$inet(r5, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:10 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x28100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000080)={0x4, 0x0, 'client0\x00', 0x0, "626a8ef183a8f912", "d8161b10509bbab96f2712aca1c8f92069991ac4e48a305e72d710f30422fdbe", 0x8001, 0x9}) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000ffffffffff"], 0x1}}, 0x0) 04:04:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x178, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xe, 0x2, 0x0, @loopback}, 0x1c) 04:04:11 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xfffffff3, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:11 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) 04:04:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0x10, 0x2, 0x0, @loopback}, 0x1c) 04:04:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xebffffff00000000, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:11 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) rseq(&(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1, 0x11b, 0x5, 0x4}, 0x4}, 0x20, 0x1, 0x0) exit_group(0xffff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="300000000000000006000000000000000600000000000000010000000000000001000000000000800000e4acc6fc35df469c34000000000000"], 0x4) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x68446) sendmsg$can_raw(r2, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x3, 0x80000) 04:04:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0x3fffffff, 0x2, 0x0, @loopback}, 0x1c) 04:04:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0xffffffe9, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0x3fffffff, 0x2, 0x0, @loopback}, 0x1c) 04:04:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0x10, 0x2, 0x0, @loopback}, 0x1c) 04:04:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xf2ffffff, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:11 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000000100)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x5) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 04:04:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000000200"], 0x1}}, 0x0) 04:04:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0xffffffeb, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = open(&(0x7f0000000580)='./file0\x00', 0x1, 0x85) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f00000005c0)={{0xa, 0x4e20, 0x5, @empty, 0x7ff}, {0xa, 0x4e20, 0x400, @mcast2, 0x1ff}, 0x0, [0x9, 0x800, 0x0, 0x4, 0x10001, 0x5, 0x9, 0xfffffffffffffff8]}, 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={'lo\x00'}) r4 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) sendto$inet(r5, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xfffffffd, 0x2, 0x0, @loopback}, 0x1c) 04:04:11 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xffffffeb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000fffffff000"], 0x1}}, 0x0) 04:04:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xf3ffffff, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xfffffffd, 0x2, 0x0, @loopback}, 0x1c) 04:04:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0xfffffff2, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:11 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xfffffff2, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x3, 0x0, @loopback}, 0x1c) 04:04:11 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) 04:04:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000f0ffff00"], 0x1}}, 0x0) 04:04:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xfffffff3, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x8, 0x0, @loopback}, 0x1c) 04:04:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xfffffff3, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 216.866401] device lo left promiscuous mode 04:04:11 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xf3ffffff00000000, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:12 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$netlink(0x10, 0x3, 0xc) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = open(&(0x7f0000000580)='./file0\x00', 0x1, 0x85) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f00000005c0)={{0xa, 0x4e20, 0x5, @empty, 0x7ff}, {0xa, 0x4e20, 0x400, @mcast2, 0x1ff}, 0x0, [0x9, 0x800, 0x0, 0x4, 0x10001, 0x5, 0x9, 0xfffffffffffffff8]}, 0x5c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={'lo\x00'}) r4 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) sendto$inet(r5, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:12 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000700), 0x52) sendmsg$can_raw(r1, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) r2 = gettid() mq_notify(r0, &(0x7f0000000080)={0x0, 0x3c, 0x3, @tid=r2}) 04:04:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x5, 0x0, @loopback}, 0x1c) 04:04:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000ffffff9e00"], 0x1}}, 0x0) 04:04:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0xc, 0x0, @loopback}, 0x1c) 04:04:12 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xffffffe9, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xffffffeb, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:12 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xe9ffffff00000000, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000fffff00000"], 0x1}}, 0x0) 04:04:12 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x101080, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f00000002c0)={0x0, 0x36}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x800, 0x108) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x8, 0xffff, "91b839ef3f416bd86796f254a739a1dc6703fb8af1e817f0304ff3c3d76511b9fda76be4a5bc47a6e77950242c522b6c01e2d2f09d80198d50f0892651db085a852c1606e59b4238a51bfdc42319cb58bca7a24cd691fd1ffabd11720344272a94892a6836ff0ebf98d484d4c0139c1e6b492de6231f538e17d2fc97e7a49e286110097abe43e5e510db6ae666336c715052747a1c4faa960ae024cc5e34cf9c711582c2db2de288055571291a3f7beb9e72683347745f0bd94ce7484d244ac7d47a2b94d0edf1400975bf9cfea9b709ce3cef7a236fe3877595e06a626a316a5261debab529c0d17a1a5860791648ce19d1a303e0d22676b621ee46b32a925e", 0xa8, 0x7, 0xa8, 0x8, 0x1, 0x5, 0xffffffffffffffc1, 0x1}, r3}}, 0x120) connect$can_bcm(r2, &(0x7f0000000700), 0x10) sendmsg$can_raw(r1, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 04:04:12 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xffffffeb, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x9, 0x0, @loopback}, 0x1c) 04:04:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0xffffffff00000000, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 217.745499] device lo entered promiscuous mode 04:04:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x240, 0x0, @loopback}, 0x1c) 04:04:12 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xebffffff00000000, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000f0ffffff00"], 0x1}}, 0x0) [ 217.966326] device lo left promiscuous mode 04:04:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000300)=0x66) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0xfc, "82820926caa622c37e1ad302695d6d6bd95dc1259c7c4b3e7c2dc21644f5d9687378e7db3f6df8bd90b50bb63ace1ca602a9169c5f05e1a1f73061606ad07c5d21bddcdbf399c7c184be74d156012122646ec891b28096e92138d37782bf291c73aae89210a35015946e4df15e1011344a175864f6cdc459a4b9c2b09711982095a75b5f4d378921972274fa8560cce54a128228354365dcf9fb1a654ea5cf4e307a3648e67544449c12f9e68657742a52f59c6c88c7836cf7841ea74dff6dc18ed88021b9f15a8ef597526a21492d17c5a3da2704d1936b4a6111ab5b7e9d9c5fae5963e2721bb6de9f3b769279914edde659d6958bcf5ce232df53"}, &(0x7f0000000200)=0x104) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000240)={r4, @in6={{0xa, 0x4e24, 0x9f6, @empty, 0x9}}, 0x35b8, 0x4, 0x8, 0xa37e, 0x10}, 0x98) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:13 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xffffffe9, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xf2ffffff00000000, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0xa, 0x0, @loopback}, 0x1c) 04:04:13 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101200, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000080)={0x2}, 0x1) 04:04:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0xa, 0x0, @loopback}, 0x1c) 04:04:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xffffffff00000000, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000200000000"], 0x1}}, 0x0) 04:04:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x4, 0x0, @loopback}, 0x1c) 04:04:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xf3ffffff, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x10, 0x0, @loopback}, 0x1c) 04:04:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:13 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7eb, 0x8680) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000080)=0xfffffffffffff001, &(0x7f00000000c0)=0x4) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf2ffffff, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:13 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xebffffff00000000, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x501, 0x0, @loopback}, 0x1c) 04:04:13 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xffffffe9, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:13 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000700), 0x52) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000040)=""/203, &(0x7f0000000140)=0xcb) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) sendmsg$can_raw(r0, &(0x7f0000001fc8)={&(0x7f0000000000), 0x10, &(0x7f0000017ff0)={&(0x7f0000007000)=@canfd={{0x5}, 0x23, 0x0, 0x0, 0x0, "0327e19a2b0100000000000000f9030008990039966a7d5c037dc1250200000000000007496e6866856b76b5010000000000000000060000000118fa1efd9b0b"}, 0x48}}, 0x0) 04:04:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf3ffffff, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000000100"], 0x1}}, 0x0) 04:04:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xffffffeb, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x4, 0x0, @loopback}, 0x1c) 04:04:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0xfffffffe, 0x0, @loopback}, 0x1c) 04:04:13 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0xffffffff00000000, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001580)='/dev/mixer\x00', 0x200040, 0x0) recvfrom$inet6(r1, &(0x7f00000015c0)=""/221, 0xdd, 0x2100, &(0x7f00000016c0)={0xa, 0x4e24, 0x800, @local, 0x5}, 0x1c) r2 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@loopback, @broadcast, 0x0, 0x8, [@local, @rand_addr=0x401, @remote, @rand_addr=0x1000, @empty, @empty, @dev={0xac, 0x14, 0x14, 0xa}, @local]}, 0x30) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0xffffffffffffffff, @rand_addr=0x800}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8000, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e05411, &(0x7f0000000100)=""/131) sendto$inet(r3, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r4, &(0x7f00000001c0)={0x8}) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x4, 0x5}, &(0x7f0000000240)=0x88) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000280)={r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x101, 0x5, 0xffff, 0xffffffffffffffff, 0x7}, &(0x7f0000000340)=0x98) r3 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r4, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xfffffff2, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x8, 0x0, @loopback}, 0x1c) 04:04:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000020000"], 0x1}}, 0x0) 04:04:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xfffffff2, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:14 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0xffffffe9, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x10, 0x0, @loopback}, 0x1c) [ 218.950186] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:04:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000f000000000"], 0x1}}, 0x0) 04:04:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf2ffffff00000000, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x22, 0x0, @loopback}, 0x1c) 04:04:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xfffffff3, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000ff"], 0x1}}, 0x0) 04:04:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x22, 0x0, @loopback}, 0x1c) 04:04:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf3ffffff00000000, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:14 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0xffffffeb, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x200, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff8100000008004500001c000000000000905b15677145f0755a0a78ffffebfffffffffeee00000000089078"], &(0x7f0000000380)) 04:04:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000300)) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f00000029c0)=""/69) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000), 0x4) 04:04:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x501, 0x0, @loopback}, 0x1c) 04:04:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xffffffe9, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000ff"], 0x1}}, 0x0) 04:04:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x5, 0x0, @loopback}, 0x1c) 04:04:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xe9ffffff00000000, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:14 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0xfffffff2, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0xfffffff2, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000007f"], 0x1}}, 0x0) 04:04:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x3, 0x0, @loopback}, 0x1c) 04:04:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xe9ffffff, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0xd, 0x0, @loopback}, 0x1c) 04:04:14 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xf3ffffff00000000, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:14 executing program 1: setrlimit(0x7, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp6\x00') ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000080)={0x5, 0x101}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a45352, &(0x7f00000000c0)={{0x10000, 0x401}, 'port1\x00', 0x0, 0x100000, 0x9, 0x0, 0x80, 0x10000, 0x4, 0x0, 0x1, 0x40}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xf) timerfd_create(0x100, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) 04:04:14 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x1ec, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000f0000000"], 0x1}}, 0x0) 04:04:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x80000) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000040)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000300)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0xfdfdffff}]}}) fallocate(r1, 0x11, 0x0, 0x3729) 04:04:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0xfffffffe, 0x0, @loopback}, 0x1c) 04:04:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xebffffff00000000, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x240, 0x0, @loopback}, 0x1c) 04:04:15 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x11, 0x4888, 0x0, 0x0, 0x8, 0x6488, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000040)) 04:04:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0xebffffff, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:15 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000f0ffffff"], 0x1}}, 0x0) 04:04:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xffffffe9, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x9, 0x0, @loopback}, 0x1c) 04:04:15 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000140)={0x8, 0xfff}, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x800000005452, &(0x7f0000000100)=0xc8) modify_ldt$read(0x0, &(0x7f0000000000)=""/144, 0x90) recvfrom$unix(r1, &(0x7f00000003c0)=""/222, 0xfffffffffffffee3, 0x0, 0x0, 0x0) shutdown(r2, 0x2) 04:04:15 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x200, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000140)=ANY=[], &(0x7f00000002c0)) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0x24d) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f00000000c0)={@broadcast, @multicast1, r3}, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000198, 0x0) 04:04:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000f0ffff"], 0x1}}, 0x0) 04:04:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0xd, 0x0, @loopback}, 0x1c) 04:04:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xe9ffffff, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:15 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xffffffe9, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffff2, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x7, 0x0, @loopback}, 0x1c) 04:04:15 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400203) add_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="35a3c29aaa50785f2536e64efbe4e177336720110999ec86a61a55e111678a7d42495562e988b9afd51bd3fb2f5225382bbb9211a94c2eebe771e45a3e11944cd1404f74f27ebf4309456e52b60353956a876c5d2f", 0x55, 0xfffffffffffffffa) request_key(&(0x7f0000000680)='syzkaller\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000700)='\x00', 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x8200) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0485510, &(0x7f0000000080)={0x9, 0x5, 0x0, 0x2, &(0x7f0000000340)=[{}, {}, {}, {}, {}]}) 04:04:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0xc, 0x0, @loopback}, 0x1c) 04:04:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xebffffff, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfc00000000000000, @loopback}, 0x1c) 04:04:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x7, 0x0, @loopback}, 0x1c) 04:04:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xffffffff00000000, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:15 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xffffffeb, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 220.704167] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:15 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001440)='/dev/rtc0\x00', 0x20c000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000001480)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x200, 0x79}, &(0x7f0000001540)=0x88) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000001580)={r2, 0xce4, 0x30, 0x10001, 0x20}, &(0x7f00000015c0)=0x18) r3 = socket(0x40000000015, 0x805, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000000)="2bdea6b5d6714907f7ccea43a5d6728f1d6640ebc0967fc2e177262acae18d5caeb981c3101173980f9e5f0fd188ab61f3538caa673d63fab37d40a665e67c80dcf2302cb1bb63e45d13f41704aa5e", 0x4f}, {&(0x7f0000000080)="3b585f1065ac85a0fd3822b496b4e44325621d9d56cdef5fe0683220ac9d06d5db271e87f5e40a1f9da60660d3e456ffe69290b55dc56634508c8b1eb22e5478668aa0aeb6cbf8ed03a43f176b79b9288f1eb7d71af3d363b036bead76a8a76a60a8f100254864d02e72aa34a55a6402312f6626ebc8c72fbc4c27a174b5183d47bf8a32f853b4f2d671518f5e065d38cd4f91a6b8e5860b7d7c2931f0d40bdbbba3a52156b04a7f3f279a3cf02a4dd209c2b42c05cbb6a09a8bcd6d71c1e703ce18", 0xc2}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1a77d339b2329669d6dcd7bcc7d347b0f7b48ecf24987a830f10eab8af88215be7cec20f2580139f123b6bc6c22f724ac6c6d41114eda6f0f54ce7908c15d63a462443dce5c192dda7f921fbf96f9da9e82ce176c122a8b1f4df0fc6c54fa5dc978919f3447d5c921635c41c0a33a530a38613304713671759088c", 0x7b}, {&(0x7f0000001200)="ce70db53d77b51b738622c5a6fbdfca92bae4af017146ceef23a06a16a850df90aa09e06f7e45e6fecfdcd60e43384448031f4e60c598eb848647573a17fda150629395aec47e2c37459c51fb264cdce7f5ab294f587ef06c39760ed293cc22f6ac1c2", 0x63}, {&(0x7f0000001280)="4bac56015cabe2cf2979e464e6281479afe3595737f74ae77ec7b830d9", 0x1d}, {&(0x7f00000012c0)="a7665d1d2477ef9a614139c8ddc900408964d66ce22f389c01285c746ddc43e251ee0c709c33ec5ef93aeee0ac466012267ab01c660d697c9b4060198768c311bc357f2bd8b380d0730f723dd250450ec90d6f49239bc61dec58543c2ad38944fe8f538cfbd9001e8f2a34375d35e48c64446b9557e8b31b77b781abe2da094779f48deaa027d212148a0ad49a1a04b07d546db1d181f7504da1f833494867b6ef", 0xa1}, {&(0x7f0000001380)="60f5dfd9921e7bbc4af522fc1a19255e4b9a68b6909c65d00a365652bb63757b4b9d232093d22d3dcd481c6d5e90768ddd3b81537d26a831b19e2f928eaaf07f8b1d47efb1f58308ca2b0049e6ef54361dab57f8fbc62b95748fc21b9a0b10ba99e7c440767115c8b7411ce0adb1b7318e76", 0x72}], 0x8) socket$kcm(0x29, 0x5, 0x0) getsockopt(r3, 0x114, 0x2710, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xc08) 04:04:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xe9ffffff00000000, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:15 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400203) add_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="35a3c29aaa50785f2536e64efbe4e177336720110999ec86a61a55e111678a7d42495562e988b9afd51bd3fb2f5225382bbb9211a94c2eebe771e45a3e11944cd1404f74f27ebf4309456e52b60353956a876c5d2f", 0x55, 0xfffffffffffffffa) request_key(&(0x7f0000000680)='syzkaller\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000700)='\x00', 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x8200) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0485510, &(0x7f0000000080)={0x9, 0x5, 0x0, 0x2, &(0x7f0000000340)=[{}, {}, {}, {}, {}]}) 04:04:15 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x3fffffff, 0x0, @loopback}, 0x1c) 04:04:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xf3ffffff, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2000000000000000, @loopback}, 0x1c) 04:04:15 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xf2ffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xffffffff00000000, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000f0ffff"], 0x1}}, 0x0) 04:04:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x800000000000000, @loopback}, 0x1c) [ 221.045278] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xf2ffffff, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback, 0x891a}}}, &(0x7f0000000580)=0x84) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x400000, 0x0) statx(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80, &(0x7f00000001c0)) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x22) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x3}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a45320, &(0x7f00000002c0)={{0xffffffff, 0x9}, 'port1\x00', 0x1, 0x401, 0x85d3, 0x20, 0xff, 0x4, 0x80000000, 0x0, 0x1, 0x5}) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback, 0xff00}, 0x1c) 04:04:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000009effffff"], 0x1}}, 0x0) 04:04:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x40020000, @loopback}, 0x1c) 04:04:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xe9ffffff, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 221.196309] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001440)='/dev/rtc0\x00', 0x20c000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000001480)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x200, 0x79}, &(0x7f0000001540)=0x88) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000001580)={r2, 0xce4, 0x30, 0x10001, 0x20}, &(0x7f00000015c0)=0x18) r3 = socket(0x40000000015, 0x805, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) writev(r0, &(0x7f0000001400)=[{&(0x7f0000000000)="2bdea6b5d6714907f7ccea43a5d6728f1d6640ebc0967fc2e177262acae18d5caeb981c3101173980f9e5f0fd188ab61f3538caa673d63fab37d40a665e67c80dcf2302cb1bb63e45d13f41704aa5e", 0x4f}, {&(0x7f0000000080)="3b585f1065ac85a0fd3822b496b4e44325621d9d56cdef5fe0683220ac9d06d5db271e87f5e40a1f9da60660d3e456ffe69290b55dc56634508c8b1eb22e5478668aa0aeb6cbf8ed03a43f176b79b9288f1eb7d71af3d363b036bead76a8a76a60a8f100254864d02e72aa34a55a6402312f6626ebc8c72fbc4c27a174b5183d47bf8a32f853b4f2d671518f5e065d38cd4f91a6b8e5860b7d7c2931f0d40bdbbba3a52156b04a7f3f279a3cf02a4dd209c2b42c05cbb6a09a8bcd6d71c1e703ce18", 0xc2}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1a77d339b2329669d6dcd7bcc7d347b0f7b48ecf24987a830f10eab8af88215be7cec20f2580139f123b6bc6c22f724ac6c6d41114eda6f0f54ce7908c15d63a462443dce5c192dda7f921fbf96f9da9e82ce176c122a8b1f4df0fc6c54fa5dc978919f3447d5c921635c41c0a33a530a38613304713671759088c", 0x7b}, {&(0x7f0000001200)="ce70db53d77b51b738622c5a6fbdfca92bae4af017146ceef23a06a16a850df90aa09e06f7e45e6fecfdcd60e43384448031f4e60c598eb848647573a17fda150629395aec47e2c37459c51fb264cdce7f5ab294f587ef06c39760ed293cc22f6ac1c2", 0x63}, {&(0x7f0000001280)="4bac56015cabe2cf2979e464e6281479afe3595737f74ae77ec7b830d9", 0x1d}, {&(0x7f00000012c0)="a7665d1d2477ef9a614139c8ddc900408964d66ce22f389c01285c746ddc43e251ee0c709c33ec5ef93aeee0ac466012267ab01c660d697c9b4060198768c311bc357f2bd8b380d0730f723dd250450ec90d6f49239bc61dec58543c2ad38944fe8f538cfbd9001e8f2a34375d35e48c64446b9557e8b31b77b781abe2da094779f48deaa027d212148a0ad49a1a04b07d546db1d181f7504da1f833494867b6ef", 0xa1}, {&(0x7f0000001380)="60f5dfd9921e7bbc4af522fc1a19255e4b9a68b6909c65d00a365652bb63757b4b9d232093d22d3dcd481c6d5e90768ddd3b81537d26a831b19e2f928eaaf07f8b1d47efb1f58308ca2b0049e6ef54361dab57f8fbc62b95748fc21b9a0b10ba99e7c440767115c8b7411ce0adb1b7318e76", 0x72}], 0x8) socket$kcm(0x29, 0x5, 0x0) getsockopt(r3, 0x114, 0x2710, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xc08) 04:04:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x79, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000ffffffff"], 0x1}}, 0x0) [ 221.262826] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:16 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xf3ffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x600000000000000, @loopback}, 0x1c) 04:04:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xf2ffffff00000000, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff000000, @loopback}, 0x1c) [ 221.443509] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfffffff3, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:16 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xf2ffffff, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:16 executing program 3: mkdir(&(0x7f00000000c0)='./control\x00', 0x8000000) r0 = open(&(0x7f0000fbe000)='./control\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f000001aff8)='./file0\x00', 0x20040, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x40049409, r1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) 04:04:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000ffffff9e"], 0x1}}, 0x0) 04:04:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xebffffff, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 221.506135] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x3, @loopback}, 0x1c) 04:04:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x3e8, @loopback}, 0x1c) 04:04:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xffffffe9, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000002000000"], 0x1}}, 0x0) 04:04:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback, 0x891a}}}, &(0x7f0000000580)=0x84) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x400000, 0x0) statx(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x80, &(0x7f00000001c0)) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(0xffffffffffffffff, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x22) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x3}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a45320, &(0x7f00000002c0)={{0xffffffff, 0x9}, 'port1\x00', 0x1, 0x401, 0x85d3, 0x20, 0xff, 0x4, 0x80000000, 0x0, 0x1, 0x5}) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback, 0xff00}, 0x1c) 04:04:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) r1 = getpgid(0x0) r2 = dup(r0) accept4$inet(r2, &(0x7f0000000080)={0x2, 0x0, @rand_addr}, &(0x7f00000000c0)=0x10, 0x0) prctl$setptracer(0x59616d61, r1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) close(r0) 04:04:16 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xf3ffffff, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 221.755877] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xffffffeb, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 221.804303] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x8000000, @loopback}, 0x1c) 04:04:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xf2ffffff, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xd2001080, @loopback}, 0x1c) 04:04:17 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xe9ffffff, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfffffff2, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 221.973740] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:17 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:17 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x8) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000100)={0x3, 0x0, [{0x80000019, 0x7ff, 0x498c, 0x3, 0x8}, {0x3602b952f1754b4e, 0xc5, 0x9, 0x5, 0x77}, {0x80000000, 0x3, 0x3, 0x7, 0x3}]}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syncfs(r0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97}) 04:04:17 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffff3, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfe800000, @loopback}, 0x1c) [ 222.060897] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x9d5dfeff00000000, @loopback}, 0x1c) 04:04:17 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xebffffff, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xfffffff3, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 222.209340] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 222.234092] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe803, @loopback}, 0x1c) 04:04:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000140), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="00000100000078b7dd2f4b6f16a683a828f399c902fe5c37e1f54b2bcee07a76ccf4937ba5e73b9ce8297ea949164b12c77386b83e2ec69350f1a58be0cdea6f1c5456dff2954f668d88bf7191eacc04812b6e9a8d2f7ef0e59ca05f670ac793aa491d51d12562e07a3a520c88ec378ef521b86fa3d0182973cb511d8d04c8bd1c2be03e5020f3dde24af8288703b9cb432dff90d0f81273962fe7580219e13e5e049ab6e12e"], &(0x7f00000002c0)=0xa) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@ipv4={[], [], @dev}}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x13f, 0x1009}}, 0x20) fremovexattr(r0, &(0x7f00000000c0)=@known='user.syz\x00') ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000040)=0x200000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') 04:04:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc0fe, @loopback}, 0x1c) 04:04:17 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000007fffffff"], 0x1}}, 0x0) 04:04:17 executing program 1: io_setup(0x401, &(0x7f0000000040)=0x0) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x802) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x4b6eb74c, 0xc0000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x10000, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x7fff, 0x0) r5 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000380)={0x2, 0x0, @rand_addr}, &(0x7f0000002400)=0x10, 0x800) r6 = syz_open_dev$mice(&(0x7f0000002500)='/dev/input/mice\x00', 0x0, 0x200) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000002580)='/dev/audio\x00', 0x220000, 0x0) r8 = socket$packet(0x11, 0x0, 0x300) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002780)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000002800)='/dev/rtc0\x00', 0x400, 0x0) socketpair(0xa, 0x802, 0x1, &(0x7f0000003840)={0xffffffffffffffff}) socketpair$inet(0x2, 0x5, 0xe2, &(0x7f00000038c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000004900)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = epoll_create(0x2) r15 = openat$cuse(0xffffffffffffff9c, &(0x7f0000004a40)='/dev/cuse\x00', 0x1, 0x0) r16 = socket$nl_generic(0x10, 0x3, 0x10) r17 = openat$rtc(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/rtc0\x00', 0x4c00c2, 0x0) r18 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe2(&(0x7f0000004c80)={0xffffffffffffffff}, 0x4800) openat$autofs(0xffffffffffffff9c, &(0x7f0000004d40)='/dev/autofs\x00', 0x80403, 0x0) io_submit(r0, 0xa, &(0x7f0000004d00)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x2, r1, &(0x7f0000000400)="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", 0x1000, 0xfffffffffffeffff, 0x0, 0x1, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x0, r3, &(0x7f0000001400)="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", 0x1000, 0x4800000, 0x0, 0x0, r4}, &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x3f, r5, &(0x7f0000002440)="6e8624ae80b8b1f9974a2a8d12785494678aff03209aae269bd18bc746e757278cb9924457e5b8c12f6a32866eb483dbe8bb26c19afe2cfc76edbbfcec7d60caac3f833e41d00dcc5b91752567b52838be869b607976c4aa3157e95f828c8a2b2f5791f3ae43691d5427564166b3fe6e884e0fe609ade788b78ac139fc13f0d3b0da806de1e7f59bc3b091f1adf71b9a8cb485d139281e9d3929713a0c2e27012bb5c397f3d56d8407139639e13ea36c6034e3f3368bbeed5fbeed87d838", 0xbe, 0x401, 0x0, 0x1, r6}, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x7, 0x7f, r7, &(0x7f00000025c0)="b12b98f61b8275beba3754b84742216b5f3a89deba07479e0b0783d067fb8fc4b15d5f9aaec4c3693561ec526eafa774cbb5233481fadfc8c099bbfb6a17e09b471eabb43872134b8a6f85e55950c993fa79bfec170076deeced92b04b5949e2474a4d9816f878b830dc39b29539c3c1af3001c37202436203ff985f1a29", 0x7e, 0x81, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x1, 0x2, r8, &(0x7f0000002680)="b9432022b55eece6f5e51d0e04d2e4942e1ab235d39562ff36172a27173e95e47fef0437bb524ca4360247a89f962589fcdc88c5ae3513a67a820b60bf85b533f5c8cc57c2f3fd10616a9277457b4954e9943b2110484cec2cb2aa6c9eb5e3b580b0458f33d58898e122ba04b8e983e4661b148830fc094861d482e0905f34d18f5e6f1f04e4ec404f7608f1c797fcf38c5337e3349b7bbb6f0b7580f74294c2bee08bc0519d6c46691b3dc1ed71aff8d609cda11e21e0a029d3dd9c2a047643515e1ca0d50cf5de8d7e5940e0adfcf0688df243ecf5cf7609bc1e", 0xdb, 0x90, 0x0, 0x1, r9}, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x2, 0x1, r10, &(0x7f0000002840)="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", 0x1000, 0x1, 0x0, 0x0, r11}, &(0x7f0000004940)={0x0, 0x0, 0x0, 0x7, 0x1ff, r12, &(0x7f0000003900)="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", 0x1000, 0x7, 0x0, 0x1, r13}, &(0x7f0000004a80)={0x0, 0x0, 0x0, 0x2, 0xc7, r14, &(0x7f0000004980)="3dca4023dca2c358b9ed2f9f7e091f98dbc671239ae82f563fbbf16ce8a86cebcff3045577cb4d3b1ce31183b118f6808b9f7579538c5fb1d209a06d224a0500636a60fdbc588da13a22a906e3ab530e84a038bfdaa77f7948117fa7609623c2a82503449e8e9617fc9a16a5168e539307938bb201dd30bd78f4762f0656ef1e5c13edc7f95d647e96ae9e4126d8c626eccb39291cdc92505b0977a2ac87406d7c0d5a0f86cc90dc39e12f7a98120d424f0dae", 0xb3, 0x8, 0x0, 0x0, r15}, &(0x7f0000004b40)={0x0, 0x0, 0x0, 0x7, 0x9, r16, &(0x7f0000004ac0)="0a88fd6ecacc5de2439db25340bd03e51eecc8e8110a8ee116225655277024ca8cc5a46784019de249", 0x29, 0x1000, 0x0, 0x1, r17}, &(0x7f0000004cc0)={0x0, 0x0, 0x0, 0x3, 0x5, r18, &(0x7f0000004b80)="01b44e970254c085d0d9bfdf1f746c81619f041b8f5b379dff583b298640362d7fd2e680869362a770b9ae8e36569bd05b49887eb046aacd6efdbc6dc7b0931eae257ff6c49a3689fb6096fe53cc7aed21bf14895ccaa596a7802e4a384aff4357210d8c35154d199ae7a95556eaaa873a6564a1ddffcabd3d8bbb752d17ddb2e1fd55bffe65ffba5151ae12ff8b143f47d5dd965126d008e053862cb2bed7061cb3d8c301f42f1435c6894325e26b1e3da149209bb4f193a4055eabeb5fd75431a5fc46eac2acfbb01049abcfb7c4e84e24f9894080d83382177ecc01e6ded115", 0xe1, 0x4, 0x0, 0x1, r19}]) openat$ashmem(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r20 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') ioctl$SG_SCSI_RESET(r20, 0x2284, 0x0) preadv(r20, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 04:04:17 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xffffffeb, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xffffffeb, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:17 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xfffffff3, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:17 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xf3ffffff00000000, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 222.665071] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 222.699169] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:17 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000fffff000"], 0x1}}, 0x0) 04:04:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4002000000000000, @loopback}, 0x1c) 04:04:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xffffffff00000000, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf401, @loopback}, 0x1c) 04:04:17 executing program 3: r0 = request_key(&(0x7f0000000280)='ceph\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='selfposix_acl_access\x00', 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000840), 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r2) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="c6a34e987940ea478d9bd365b9e4621e334652733324b7773a3df8a7504d9e18e2e4a839fcd9030000000000000028945d12a9caae603ff81c4dc32ed3d70fb5d4c5b866305249060000005277822d0e0616a2e5b74c48e38b9936f298c6feec95ad327c724ec507bd34b94e99623f014bf81ea54900ac54a99aa04e1a7f000000e8d3bfa2f3abce9736aac3e0b19d5a697bc438cd49bc1cf3af72c2180bbee78e9a7237c02e10ac77e3a4fd8a6e2bdca6a9a1d7da1a3e559fdafb6703c73b3c4c10865302fb324f16327996273625d9f0a54ef16bdb08f22ed11fd80b74eb861aebe51b0912c0f79486c25c49524ffe4f00", 0xf2, r3) request_key(&(0x7f0000000580)="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", &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3, 0x29138c2e}, &(0x7f0000000300)="af0719dcc2380b4623dc8c7a581973a96d57452035fca47b18e7992f4c82e608a92c436783ee4e3264245238b946a4a11d39b7873e5f3296185625d49ae13974d13940d0c01a5029b35aec2234860f6525f00000000000050000", 0x0) [ 222.873007] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:17 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xfffffff2, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xe9ffffff00000000, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000000001"], 0x1}}, 0x0) 04:04:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x783, 0x101000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000380)={0x4, 0x0, {0x0, 0x3, 0x40, 0x2, 0xfffffffffffffffc}}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x9, 0x20003) r3 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x10000, 0x10000) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000300)) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000180)={0x5000, &(0x7f0000000040), 0x4, r3}) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="747275737465642e2f6465762f646d6d6964692300f5aaa4b83a7b14e866a599fc23c80974a56b4da85f1e95a8dce09095d0c4bc5cf0d1c0600a28015f"], &(0x7f0000000240)=""/166, 0xa6) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='ip6_vti0\x00', 0x10) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 04:04:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5455010000000000, @loopback}, 0x1c) [ 223.012790] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x484000, 0x40) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e21, 0x5, @mcast2, 0x8}, 0x1c) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0x2) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000002c0)) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000080)=@buf={0x26, &(0x7f0000000240)="bbf5b28919c4d07af424aa037e814a68d6d428c059f694dd79c8666ecc42c0627a32cd43a445"}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) ioctl$KVM_NMI(r4, 0xae9a) ioctl$BLKBSZSET(r1, 0x40041271, &(0x7f0000000140)=0x800) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@mcast1, 0x4e21, 0x0, 0x4e24, 0x52, 0x0, 0x0, 0x80, 0x2c}, {0x8001, 0x5, 0x9, 0x4, 0x7fffffff, 0x5, 0x7fff, 0x1}, {0x4, 0x0, 0x8001, 0x5}, 0x781c, 0x6e6bbe, 0x0, 0x1, 0x0, 0x3}, {{@in=@local, 0x4d2, 0x3b}, 0xa, @in=@multicast1, 0x3502, 0x3, 0x2, 0x6, 0x20, 0xffffffff, 0xff}}, 0xe8) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="cdff"], 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 04:04:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xebffffff00000000, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:18 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xffffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 223.125981] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xebffffff00000000, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000000200"], 0x1}}, 0x0) 04:04:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x600, @loopback}, 0x1c) 04:04:18 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xe9ffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf2ffffff00000000, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xffffffff00000000, @loopback}, 0x1c) 04:04:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x7801}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000f0000000"], 0x1}}, 0x0) [ 223.359276] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf2ffffff, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 223.474789] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xfffffff3}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:18 executing program 1: r0 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0xfffffc35) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) getsockopt$bt_hci(r1, 0x10d, 0x1, &(0x7f0000000080)=""/86, &(0x7f0000000000)=0x56) 04:04:18 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x3, 0x40000002871, 0xffffffffffffffff, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x7, &(0x7f00000cc000/0x4000)=nil) mmap(&(0x7f0000000000/0xfd8000)=nil, 0xfd8000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) ioctl$int_out(r0, 0x5462, &(0x7f0000000040)) rt_sigreturn() 04:04:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x54550100, @loopback}, 0x1c) 04:04:18 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0xebffffff00000000, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc4ffffff, @loopback}, 0x1c) 04:04:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000fffffff0"], 0x1}}, 0x0) 04:04:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf3ffffff, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xffffffeb}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 223.959193] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000000002"], 0x1}}, 0x0) 04:04:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) unshare(0x40000600) 04:04:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xffffffe9, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 224.007038] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xebffffff00000000}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5100, @loopback}, 0x1c) 04:04:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4000000, @loopback}, 0x1c) [ 224.096362] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 04:04:19 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xe9ffffff, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 224.205359] IPVS: ftp: loaded support on port[0] = 21 04:04:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000f00000"], 0x1}}, 0x0) [ 224.239755] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 224.266661] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x1802, @loopback}, 0x1c) 04:04:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xfffffff2, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:19 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x141002, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) name_to_handle_at(r0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0xf9, 0xfff, "787392f6a505fdd6c0c70e90a2840c30325fa08b4d0b1287b529e6e7cb7142761e7c6d3d4ac8addb409bec322f86947485b78904682affe7c4d444ba357c3ef0941416731ad4e255757e13723bd7f8f2476bda5dd88391bd8a8a8ca30a4eaeeac786fa20da4425b5375972f87df32a122e1e625b8744b06845b7e46e5374aa25fe61f0a88485ddd9573b38060707c1e6726723b2f0f172e26848a5d6fd7467c57e1fd9bf82c8f9f0daa6660591bd1d147b3bd1029ae3cae043fde098f733a328df596253d76af18683f5bd4f1cb6aa32037c51ce690f209275535a3b79dbc5ccbc0c8cb1b6779d32bd5009db6847c6bb99"}, &(0x7f0000000440), 0x400) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r3, &(0x7f00000002c0), 0x973, 0xfffffffe) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@default_permissions='default_permissions'}]}}) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f000002f000)) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x2, 0xa7) 04:04:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000f0ffff"], 0x1}}, 0x0) 04:04:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x3000000, @loopback}, 0x1c) 04:04:19 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xebffffff, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'gre0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="74000000110000032cbd7000fddbdf2500000000", @ANYRES32=r1, @ANYBLOB="0004000000200000080020ac34ae8f03016b7a78280006000000080020008100000008000d00030000000800250008000000080023000104000008001e00f2ffffff1400030173797a5f74756eb900ff0000f8ffffffffffffff0300000008000a0000000000"], 0x74}, 0x1, 0x0, 0x0, 0x2004c090}, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="340000001400010027460a7ad4d98f1836000000008000000002000000", @ANYRES32=r2, @ANYBLOB="14000600004003003f0000000000000000000000080002007f000001"], 0x34}}, 0x0) 04:04:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xffffffff00000000}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 224.540776] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 224.561387] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2, @loopback}, 0x1c) 04:04:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000ffffff"], 0x1}}, 0x0) 04:04:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf3ffffff00000000, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xf3ffffff00000000}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff0f0000, @loopback}, 0x1c) 04:04:19 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2c7c579a7ae9c96d5cc9ad926a3eea1cf89515d52fc4300c0d33f21c491f50289b7a492cc0c90f234201a5c6f9b830f910b1902ed60d51ad019c73fc9065aa2c519f654874b01f87db4a2807b6a2c2532e9d54e219c9c5f95f", 0x59}], 0x1, &(0x7f0000000440)}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b0145f8af9aa0ed0e18bc50509eaef21c8e03842a97df3a462ea3f9d5f83bf1d4d2875f0d5b24e941483f863cd2ea7c769bd3e594fb173dd873c7d9a3fd20939ad1d5867881ed77a078007b4972aba36cae02004373a6a74d74cb15a52c5f8426cb6f235d38048fd91f5d6100fd58a335df10add227d804167ba191c7a035c5a2a916e7fef18a6003578820b3e0be26a22f2c149f40a0335cadcca64a5e44179e6ce4d7f7c16e8a96c5be7cdf66eef901cb8eeabc94bae30acca8c6fa02889c32311044dcbc9a2e02e0632f7f9aa96849abede543773745e4652fccc503003f10cd68ddab594969ad36cb622ed7ba22dc46a80fb63ac2c561a80ae5c10b295b9f75d9536ba1ac24b8e9ae217611ffe79cb9422158475c1a89a51547d13c03b68d75ffb5717a35f381774567871e9e4190272c97eafcfa0a07a751d0bc8eeb0c206e12b2cff1065a3d5622635fa44c0dcb0722ad4c97e6b7d5844b2e9bab9ba1d083fa2930a3ea267d7f15d817e2b2e055ccfbaf019292f6156efd3a9a13ea90ecf59fc1bf35c6626db1c6759a50ed84acefd3cdb", 0x257}], 0x1, &(0x7f0000000200)}, 0x8000) recvmmsg(r1, &(0x7f0000006900)=[{{0x0, 0x0, &(0x7f0000005a80), 0x0, &(0x7f00000068c0)=""/5, 0x5}}], 0x1, 0x0, &(0x7f0000006b40)) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001480)="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", 0x2d5}], 0x1, &(0x7f0000001780)}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000140)=0x5, 0x4) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 04:04:19 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xfffffff3, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 224.752710] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:19 executing program 1: syz_emit_ethernet(0xd5, &(0x7f0000000100)={@link_local, @link_local, [], {@mpls_uc={0x8847, {[{0x5, 0x9e9, 0x8, 0x8}, {0x57ca304f, 0x92, 0x2, 0x2}, {0x4, 0x7, 0xffff, 0x4}, {0x100000000, 0x5, 0xffffffffffffff38, 0x4}], @generic="7ccb15e51642817458474b97fe8796dcd3fa6352aab197ca972a0240bc329ac3d68c63599809f23e25396f0d4c63be46a3a9606d13d4b6f32dad13687f69cd9d13517fcdd0707ce976f55d05213bf2b9697aabd07e0784e64660c33d67f5bf390b31cb68245473cab06c2abe893b7f218137ed0c6ca6ba2623100fad5b7d4afd899ac50e8375c72c11d36daba2f03b10e6e73e361aca89089acc2e1adadc46989afbe5a7f93b89c54d53cffbcd5772f3a294d22c2aca72"}}}}, &(0x7f0000000040)={0x0, 0x0, [0x0, 0x2000000, 0x1]}) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x200400) request_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)='eth1\x00', 0xfffffffffffffff9) getpeername$inet6(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xfd1a) [ 224.852305] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xe9ffffff00000000, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5555000000000000, @loopback}, 0x1c) 04:04:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xe9ffffff}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:20 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xffffffe9, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000020000"], 0x1}}, 0x0) 04:04:20 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f000000c000)={0x9, 0x0, 0x0, 0x0, "ddfbe36de3f9b5e3e004bcc0ae4de5d4e831c68b6c2956c2874476ee83e417454f684cab6a71b139644ea97a"}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x9, 0x0, 0x1ed, 0x0, 'syz1\x00'}) 04:04:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfc000000, @loopback}, 0x1c) [ 225.043342] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:20 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xffffffe9}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xe9ffffff, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:20 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xffffffeb, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000ffffff"], 0x1}}, 0x0) [ 225.146172] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5000000000000, @loopback}, 0x1c) [ 225.330054] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:20 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000002240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x383) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000000c0)) preadv(r0, &(0x7f00000017c0), 0x0, 0x4000000) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000000)=0x11000) 04:04:20 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xfffffff2}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xebffffff, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:20 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xffffffff00000000, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5555, @loopback}, 0x1c) 04:04:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4000000, @loopback}, 0x1c) 04:04:20 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000140)={'vcan0\x00'}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x880, 0x0) r2 = socket$unix(0x1, 0x7, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)=""/234, 0xea}], 0x1, &(0x7f0000000300), 0x0, 0x4}, 0x20) r4 = inotify_init() r5 = openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x800, 0x0) mbind(&(0x7f0000e57000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000480)=0x3f, 0x8c, 0x4) ppoll(&(0x7f00000003c0)=[{r0, 0x4000}, {r1, 0x208}, {r2, 0x100}, {r3, 0x2040}, {r4, 0x4004}, {r5, 0x200}], 0x6, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000440)={0x4}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='maps\x00') mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000000), 0x1, 0x2000000000002) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) [ 225.704894] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 225.734053] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffff3, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:20 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xe9ffffff00000000}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:20 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xf3ffffff00000000, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x10, 0x75e6, 0x7}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = gettid() r5 = gettid() kcmp(r4, r5, 0x0, r0, r3) pipe2(&(0x7f00000000c0), 0x0) 04:04:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5555, @loopback}, 0x1c) [ 225.905616] mmap: syz-executor3 (16148) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 04:04:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4002000000000000, @loopback}, 0x1c) [ 225.951298] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000f0ff"], 0x1}}, 0x0) 04:04:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xffffffe9, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:21 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xf2ffffff00000000}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xaaaa000000000000, @loopback}, 0x1c) [ 226.046062] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:21 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xf3ffffff, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:21 executing program 1: socket(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140), &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080), &(0x7f00000002c0)=0x8) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x1) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000380)="dda0088b2483967afe19e2f1886375d85bf185c29e579e44bfe80a23a45c5a7ad171529d25aded6f12f4195555117db89b8bd68ecd343dccc5838a9fb4e97b58ea2ee7e8e773f2d6f4b0c78233fa63803b3df40e733c301d038b81699cb68ba67bf885d3781f25db02c326487f8406eb1d1fd67201e5899b1907e91af45cd1d4e428df0bf87816b46b35ebea2fcee5455e8b49e3087bbacdee8490b989fcbbead1df3cd19864a5784241d54540960404c248f2cfe4370d52e3452250bb91afc390621bdb482a9798a7ad887a6ffbb5ff73aca7025d2b4fd6282ad25f6eeae2e10f1e9cd538fde587c51740ef89d1d4d5d092b01a21ad0a9315") setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000100), 0x4) r1 = socket$inet6(0xa, 0x202000000802, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000340)=0x4b, 0x7ffffffe) 04:04:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000ffffff"], 0x1}}, 0x0) 04:04:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xffffffeb, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 226.209686] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:21 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff800000000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendfile(r0, r3, &(0x7f0000000080), 0xfffffffffffffffe) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000000000000710000400023000000000000000000000c55ae7acdcea0d2c408cbc98fc10e26ce93601dc7981e87f400faec499348d0bdaed5ac3f47c6d0ccd33e8abf3560"]) r4 = dup2(r1, r2) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000040)={'erspan0\x00', @remote}) 04:04:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x8dffffff00000000, @loopback}, 0x1c) 04:04:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000f00000"], 0x1}}, 0x0) 04:04:21 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xebffffff}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x8000000, @loopback}, 0x1c) 04:04:21 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffff2, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:21 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001380)=@broute={'broute\x00', 0x20, 0x4, 0xd71, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000001d0000005000000086dd766c616e3000000000000000000000007663616e3000000000000000000000007465616d5f736c6176655f300000000079616d30000000000000000000000000aaaaaaaaaaaaffff00ffffffaaaaaaaaaabbffffffff00ff000070000000ac0000001c01000052415445455354000000000000000000000000000000000000000000000000001800000073797a3100000000000000000000000000030000010000006e666c6f670000000000000000000000000000000000000000000000000000004c000000ffffff7f3f000100000000005e071320171e84167c2b9e06b1ad5d8ca1a181fb09d5a2ba89ce47c1361cb9f867b380c9aa6c4a355f7c5bc7fad988f054c601d0904a40714adc25148f7298ab1700000008000000000c726f73653000000000000000000000006272696467655f736c6176655f3000006e72300000000000000000000000000079616d30000000000000000000000000aaaaabaaaaaaff00ffffffffaaaaaaaaaabbff00000000ff0000b40800001c090000440900007533320000000000000000000000000000000000000000000000000000000000c007000001000000030000000800000001000000000000000300000000100000030000000100008000000000010000000300000000000000030000008e0000003f000000cb00000003000000040000000300000000fcffff0300000011f30000070000000100000000000100f7ffffff7f000000000400000300000081000000080000000200000001040000ff01000004000000ffffffff0700000002000000ffff000009000000ff01000000000000060000000b060000050000000300000100000001000000030000008b430c0000030000004000000000000000e500000003000000040000000000000009000000000000000000000001000000e9000000000000000080000040000000050000000100000050df000001000000038000000101000008000000730000000700000007000000030000000200000008000000060000000100000003000000f004000020000000070000000100000003010000080000000300000001000000030000000000008003000000000000800300000001000000000000f807000000020000008100000002000000ebc80000030000006ed6000001000000000000000300000000000000030000000100000002000000080000000400000002000000080000000900000008000000a1a800000400000001000000000000000800000003000000d5000000060000000000000005000000d00100000700000000040000000100000b0100000600000000000000090000000200000006000000020000000700000003000000000001000200000003000000030000000000030000000900000003000000bc0000000200000007000000030000000000a0000200000000080000fffeffff000000003f00000000000000080000002c0000005a00000000000000010000002f0b0000000000001f000000ffffffff070000000800000003000000070000001a2d0000b6be000005000000020000000b0a000000010000010000000900000000000000ff000000020000000600000003000000330f000003000000090000000300000004000000150000000400000001000000010000000000000009000000010000003500000003000000050000000400000001040000dae7ffff1709000006000000070000000000000003000000050000004a41000001000000030000008100000009000000090000000200000000000000010000800d000000090000000100008002020000040000000200000008000000030000000100000001000000040000000300000002000000000000000400000000000000020000000300000008000000030000000101000000000000060000000100000002000000030000008d8c0000050000009940000008000000faffffff07000000040000000900000000800000fbffffff84e5ffffff0f00000300000081000000040000000400000005000000fcffffff030000000f090000ff0f0000050000000004737706000000030000001e08000001000000ff07000001000000000800000300000079a9c679030000003d0300000000000008000000000000000100000a03000000ffff00000100000004000000000000000100000001000000b388834908000000070000007dca000007000000010000000300000003f9ffff0100000003000000030000000800000008000000ea0e0000840000000400000007000000010000000000000001000000ff010000ff000000060600000800000003000000010000000300000000000000000000000000000002000000800000000000000006000000030000000400000001000000090000000200000001000000010000001a0c00000300000008000000010000008000000000000080350000008fbf0000000000000300000001000000f8cf00000100000000020000090000820b5ed700000000001f00000008000000ffffffff05000000070000000000000005000000ffffff7f120a00000a070000010100000000000000000100030000009e96e177020000000000000003000000067b00000000000003000000030000004000000003000000ff0f00000200000209000000030000002d00000000000000080000000300000000000000910000004000000030ae00000600000006000000810000000800000007000000060000000400000041950000010000001f000000020000004000000008000000ffff00004cff0000db050000010000008fe400000606000000000000030000006a0c0000000000000300000001000000070000000100000030030000030000000900000001000000bc00000003000000ff0f0000000000000000000001000000f9ffffff0000000002f6ffff02000000030000000000000080000000070000000300000008000000800000003806000005000000fe280000faffffff070000000000008067000000430000000100000001000000030000000200000004000000c60700009500000002060000800000000300000001000000030000000900000000000000be0b0000030000000800000001000000020000000000000005000000ad00000006000000030000002000000001000000070000000300000003000000030000007800000001ffffff0100000003000000da00000051f6c00700000000040000000200000000000000020000000900000003000000ffffffff400000002000000006000000000200003f00000064090000980000003a0000000b0500000000000072617465657374000000000000000000000000000000000000000000000000003c00000076657468305f74685f62726964676500697036746e6c30000000000000000000200003000500000042f100000100000002000000ff030000010000006d61726b0000000000000000000000000000000000000000000000000000000008000000000000000000000052415445455354000000000000000000000000000000000000000000000000001800000073797a310000000000000000000000000200000000800000434c415353494659000000000000000000000000000000000000000000000000040000000400000000000000000000000000000000000001000000000000000000000000000000000000000002000000fcffffff020000000f00000058000000809b6272696467655f736c6176655f31000065727370616e3000000000000000000076657468300000000000000000000000726f736530000000000000000000d1afe06b66e686776a4bff00002031e1c163850000ffffff00aaaaaaaaaa13ffff00ffff0000009c020000f00300002c04000062706600000000000000000000000000000000000000000000000000000000000802000005000000080006fc09000000040000027f0000008000050106000000ff0080020900000008000302510a0000800000ff07000000b90005c9ff030000d4e8010106000000090000060300000081000600ff07000005000478400000004c000004030000004900ec03ac0000000900ff010100000080000007960600000000070406000000090007fb00000000000080010600000009000220ff01000003003fff03000000008000000900000000000408ff0000000700640900000000040000f909000000ff07401cfeffffff08000000cb0e0000ab0b0909030000000000092edb0c00007e5fa70804000000030000060000000001000000030000000500ff08020000000400082c070000000100010302000000000000090600000007000609020000000300fc200200000004005008bd000000eda2074093ae0000feff0408010000000104000809000000060000017f0000000300026000000000060006c5080000000600150600fefffff8ff0720000000000080010001000000ffff02090400000000f00807ff0f000003004c0904000000ff0fffff00000000030020094000000083a7ff01080000000100ffd8c0ffffffaa0205d8000000000000ff0005000000020002010000008002000607ff0700000100000100010000ce2c0005ff01000006000101c30000000000ff01fd4cae8c7c75e18ee62eb83885defdf0a001294fda5f5d97db4f42064bae2c0f8f6c5227f0d81811832fb3476ff8c5fda7701a19733a310673f71e1efaa8b7c14129380612ba606a74616c8ca2202e0d025d3142f4391b74d02241a32c969a80b4417e9f01e3f3911972612c2a0b04aa65aef355f79ad2501e45505b1030d3f14e47340824da2c5b50a0814689b8e1a9e1ff7a5c0433763b4ecff4a5bd10803b12a5b60e0ef740a713f0cf93ef39aa2afb2dcc32f04ce21336de156c8fbc88e2a751d481fc3489fd9baa6c05b4b9d67f11"]}, 0xe62) socketpair(0x7, 0x6, 0x80000000, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, [], 0x19}, 0x8}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e23, @multicast1}], 0x6c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xa202, 0x0) write$sndseq(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @time}], 0xfffffffffffffe1b) 04:04:21 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xfffffff2, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 226.854032] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 226.877628] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:21 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000f0ff"], 0x1}}, 0x0) 04:04:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x79, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x6, 0x6, 0x0, 0x2, 0x0, 0x70bd25}, 0x10}}, 0x40000) 04:04:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xf2ffffff}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil}) fcntl$setlease(r0, 0x400, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000080)='net/ip_vs\x00') preadv(r0, &(0x7f0000000480), 0x0, 0x0) sendmsg$alg(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="cba3cc4686fe89e2d08042b38826fd779e792ab19256d3588cbb542b7533920aa9ff903d9a66c118b4a277352459f29802188a52ad6543dbbcfb66539b2d4625a56cf245b5d2bb99662d18a796c07eca560b1573108f3abb", 0x58}, {&(0x7f0000000200)="0a7dae622c9f00183912bd069c1960f16b18e14a3dc94080b93c01c47453294de7590b345eed84169ef77ee4eb40302f65f27df359ded118fb123bc70e2ba4864565ec3580bd14c499f4dd05d49c8fd12ee6a856b1156be273ae2452140739c84b8f3e3cf0972511cd31ca2e7127dab56a113f9a6c19acc96aa5b670df06009fe1785eb996be99d76ecd5f550058b1dc75e1910fb6f87e5eeffc9381f22c84fb22b4cb6da185eb257d95434ffa1aa4d0559077d94d32f98d6874b6a117fd1c0187b5aba645f720563a6cdaca5ce612ec25c98ce1c0342ad70d939acca9b652d017475866fd1e2f9d983f942b0444bf", 0xef}], 0x2, &(0x7f0000000300)=[@iv={0x10c, 0x117, 0x2, 0xfc, "597030aa1758f4a927b234387d36ede71c8efa2afc63bb45985e96214b5b1e30a9b658e1c21b113762a04dd72db9e7d5f0fbd9c0bccbe2b8d3824a6af5fa4adac74d262f409a244a17db8c13429bd19360e99b5afaa3640f480a5f2d83e10f583b3576ea44ab81832994eaa327f7bad4e0a6292decb14fff5c3c12911058a5ac3c0049fe70dba9097a18f1b32c74512910b340dbdb52a8e99c4f98fa562c0eecff74122f2929bef26817b9a9003bd81e7edc805ba2053f025615ffd1f8895e22fcae4e5aa6b93886f1a232d2cbcdabd5f366d90ee1bd7873771e46ecb3b8d0fa4566657a08e86ad451e985ca54622016753b43174df1b08f53bf5041"}, @op={0x10, 0x117, 0x3, 0x1}, @iv={0xd8, 0x117, 0x2, 0xc6, "f44e371f8c23ca06396e520023552514fdf09d567d8bf83376ec055dea5fba0825db8fb98e9d2419eb4cc08eb03a52b5e81e5d81d3501743c40c5113d96df21464136a3125948f7eb1bd902790ff6cba1974f66cdfe47d08a4bad95c505db7f4b0ce0b339fcb3dfa69ab31443cf83b4db0fd01b11e9d8a8656bc0841f89e2027e369ee75c4528689faeb1b8c0399c116e8f5eec09449ab4757a6aa68ab08e2cb3ced1719b61541d5de5f42618eaa1339ac23062e928ef8e9e890a8928933eabff309c7575309"}, @op={0x10}, @op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10, 0x117, 0x4, 0x6}, @iv={0x68, 0x117, 0x2, 0x58, "9ce40b6818efa03043b3972d587a78bd2865127166b8df3dd448673d6b2d03c6faace572d70ff3993214e172a3bbd8ba72f550b29bd96c72438a91861aa7c79b5cc9e62b4d554eb27c72a73f6d7aa8faba2c98aca2e17f10"}], 0x28c}, 0x400c1) fstatfs(r0, &(0x7f00000000c0)=""/167) prctl$void(0x0) socket$inet6_udp(0xa, 0x2, 0x0) userfaultfd(0x80800) fcntl$setlease(r2, 0x400, 0x0) 04:04:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc2ffffff, @loopback}, 0x1c) 04:04:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x200000000000000, @loopback}, 0x1c) 04:04:22 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xe9ffffff00000000, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 227.095226] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x4}, 0x10) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0x60) 04:04:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0xf3ffffff}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:22 executing program 3: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)="6c6f67696e7569640039dad3c444de4a35f0fd223db6aa1e2fdd63c225bbb6450080000000000000b4919c1a04000000000000009b23912e9b96566ebf23618dfdd331fcacfeccdb938974f48d420c49e5b37f94bdb651b9c102659034f419d42f") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r3 = gettid() write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000140)={0x29, 0x3, 0x0, {0x0, 0x8, 0x0, '[*cpuset'}}, 0x29) kcmp(r2, r3, 0x2, r1, r1) sendfile64(r0, r1, &(0x7f0000000040), 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCEXCL(r1, 0x540c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) 04:04:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x7900}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 227.166002] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xf3ffffff}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:22 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xebffffff00000000, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x80fe, @loopback}, 0x1c) 04:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:22 executing program 3: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0x5f5e0ff, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @dev}}, 0x26) 04:04:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4900000000000000, @loopback}, 0x1c) [ 227.414945] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xe9ffffff}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:22 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xf2ffffff00000000, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x178, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:22 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000001140)={{0x2, 0x4e20, @rand_addr=0x20}, {0x1, @dev={[], 0xf}}, 0x0, {0x2, 0x4e23}, 'tunl0\x00'}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="54deb7e6", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e21, @remote}}, 0x10001, 0x101}, 0x88) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000001080)=0x1) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) madvise(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xf) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x10400, 0x0) r3 = getpid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) r7 = getuid() getresgid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) sendmsg$unix(r2, &(0x7f0000000780)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000240)="881f421f6962617dd3db07a5d1a926c728ddb16dde1eff5c1f2f791aa8e86c34fab34cceb194b965cf785e254aa6d4f0972fcf12c1f16dc5fe94eb9c9ca4c55ec0145aa8f7df4e2cf06759195b377c2ed57ecbe77376fa647e584cc5ffa504aa5db1be0c03a8159803787ec10b98d7444c0dbf1725d4dbdd9b51b819c88050f0b24e36441b7c8be4a83a3933c33f4407cacee3545b682faff3059c8337da55c21967e70c72981a0e3b7faf656e287b3408052d2c095022d0d8d2be03dcba3e7df64c4fa906d30a415baa2e", 0xcb}, {&(0x7f0000000340)="fbc1f2c47979de625cbea05d58463fd5e98b2d4452f8ec95d37f773dd7b09ba861772eb5349c8881f7972499e3d23a322c82c2555223680e376c17df28a93ee63505239526f441819dd3675f92", 0x4d}, {&(0x7f00000003c0)="443bc9df7a45c0e5681700cbc1b99bc146a463ddc4e18c7a31d7cf38c227480681ddef3fa80fdf465e61ca300840f9f35c61eb59972220af5671ad1dcdc32c62e425c73e3dfb4c5e47913e9382054d4cbfebef98f22d6e6ce2b0e75d5ed444520096570da5e8212533ddf8eee0df51b0a978b06149efcc9e6914936e41943bc654090de5496057ac2a8dad6d01019a69aac1a30394e2198022bd76a17576f39bddd8f7ed17d66d4facc3c043f0d17581cdbdbe5b79ce8ce953e196acfe000da866649ffa6d3e07f471432da3b41a8104b11496670d8f7fc3254292af61d2775b79", 0xe1}], 0x3, &(0x7f0000000700)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r3, r4, r5}, @rights={0x14, 0x1, 0x1, [r0, r0]}, @cred={0x18, 0x1, 0x2, r6, r7, r8}], 0x74, 0x20000010}, 0x40001) socket$inet_sctp(0x2, 0x0, 0x84) getsockname(0xffffffffffffffff, &(0x7f00000011c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, &(0x7f0000001240)=0x80) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket(0x0, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000007c0), 0x4) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000900)) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000080), 0x4) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739ddb, 0x0, 0x0, 0xffffffffffffff39) [ 227.549934] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x801000d200000000, @loopback}, 0x1c) [ 227.704630] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x20, 0x4, 0x8, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0xc, 0x2, @u64}]}, 0x20}}, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) 04:04:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff0f000000000000, @loopback}, 0x1c) 04:04:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xebffffff}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000000002"], 0x1}}, 0x0) 04:04:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0xfffffff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:22 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0xf2ffffff, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2f7a9, @loopback}, 0x1c) 04:04:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xf2ffffff}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000fffff0"], 0x1}}, 0x0) [ 227.864502] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 227.896261] netlink: 'syz-executor1': attribute type 2 has an invalid length. 04:04:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x900, @loopback}, 0x1c) [ 227.967310] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 227.977837] netlink: 'syz-executor1': attribute type 2 has an invalid length. 04:04:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x600000000000000, @loopback}, 0x1c) 04:04:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r1 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0x3ff, 0x101000) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000500)={0x5, 0x3, 0x0, [{0x5, 0x1, 0x3, 0xffffffffffffd2c7, 0x6, 0x0, 0x8}, {0x8, 0x6, 0x5, 0x1, 0x1, 0x7fffffff, 0x497}, {0x5, 0x8, 0x0, 0xd0, 0x81, 0xf5e5, 0x3}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)=0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7, 0xfffffffffffffff7, 0x20, 0x4, 0x0, 0x1ff, 0x8400, 0x2, 0x8, 0x2, 0x9, 0x7, 0x0, 0x6, 0x8c, 0x9, 0xffffffffffffff00, 0x1, 0x3, 0x3, 0x10001, 0x4, 0x1, 0xffffffffffffff72, 0x1, 0x5, 0xfffffffffffffff3, 0x7, 0x60b, 0xd4, 0x6, 0x401, 0x0, 0x4, 0x10001, 0x9, 0x0, 0x80000000000000, 0x0, @perf_config_ext={0x3}, 0x22, 0x8, 0x4, 0x2, 0x2, 0x4, 0xffffffffffffffff}, r2, 0x6, r0, 0x2) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) r3 = getpgid(0xffffffffffffffff) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000200), &(0x7f00000003c0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) setpgid(r3, r5) mq_open(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, &(0x7f0000000280)) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_netdev_private(r6, 0x89fc, &(0x7f00000002c0)="61b310a3dd32f377e1e4af4ca648469df07ff435f65451c0f057821a39d76fd5be8af3773ec895a33dc5e0522762c1746f58bf6f9b9dc321fe7e57a58a5827799c10df4a7d72305d17aba558c6b38f1c21eea205e3034f032030f7357a62c19f7f8511363578cc307b0c965b81caa81272135473fe70dbcb0f67fe065aa682e6adc6368403f0b38f4e3c3754e3c9b9bba9b2fc5473af4927c719fcc31878bdd99a662975bb1fb42e5c943aeb1ab68bc195ad72fc92f20847f9192bfb8aacfffa7a65a1d5f01889287c78b42b487deadae36c9f05b9385dbe92dde4c234b900708dad5d31a6e2a7142e07") sched_setaffinity(0x0, 0xfffffffffffffd89, &(0x7f0000000140)) 04:04:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000f000"], 0x1}}, 0x0) 04:04:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 228.102034] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 228.197432] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:23 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x2, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000280)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x0) 04:04:23 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xfffffff2, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfffffff5, @loopback}, 0x1c) 04:04:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xffffffeb}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff0f000000000000, @loopback}, 0x1c) 04:04:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x7801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000009effff"], 0x1}}, 0x0) 04:04:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7ff, 0x400000) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000080)={0x2, 0x40}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000001c0)={0x28, 0x2, 0x0, {0x1, 0x0, 0x75da}}, 0x28) 04:04:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xfffffff2}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfffffff5, @loopback}, 0x1c) [ 228.563628] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 228.600132] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:23 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xffffffe9, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0xffffffe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 228.726576] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x40000000, @loopback}, 0x1c) 04:04:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xffffffff00000000}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$rtc(&(0x7f0000000280)='/dev/rtc#\x00', 0x7, 0x4000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x115040, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000004c0)={0x0, @remote, @remote}, &(0x7f0000000500)=0xc) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000680)={&(0x7f0000000540)={0x1d, r1}, 0x10, &(0x7f0000000640)={&(0x7f00000005c0)=ANY=[@ANYBLOB="02000000240000079b000000", @ANYRES32=0x0, @ANYRES32=0x2710, @ANYRES32=r2, @ANYRES32=r3/1000+10000, @ANYBLOB="030000c001000000000000803d000000a1aa07f75e8731461e318debed424883c1b265037841773e6e6989cf407a3c2907d8a82808f6446616190a5c2a76e4b21345f7396409c20036a22f61ad3db18f"], 0x6c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r4 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e22, 0x100000001, @remote, 0x8}, {0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast2}, 0x5}, 0x100000001, [0xd9e8, 0x40, 0x1, 0x6c, 0x3ff, 0x100, 0x9, 0x200]}, 0x5c) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000100)=0x2) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e05411, &(0x7f0000000040)=""/102) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f0000000140)={0xd000, 0x118000}) 04:04:23 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) vmsplice(r0, &(0x7f00000025c0)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="0cc77c067ac9f23dc6b0", 0xa}, {&(0x7f00000010c0)="34403341cd8282c991d0e8126e1eb8b2ee0030f64b2cd975f0240320813d362a25d383e10b49a6871ecf307042136f80c34f23556c526a248ab0bd89c84749d2d375b626f315d03f54ee5b0e50a0ba809fa15bb173470186f26736fefa2f1096f993d2763fec3d4e76cd10c141976f88dc27c96599330faf3a3706a44ab1b8aa668ac9d0b217768eab618c9339d3671021ea79aa7dcd58f8f5ee4d15d4e6a05f0a8137404095e5aba89137d67d502f1dd19cf5d4cd6a51cc80a3d81f175ab6f3241078dbe17ac5973352948eb29edb6448f55f8c271288e2b901", 0xda}, {&(0x7f00000011c0)="e4d261c3093deb8da066ee1ba6d990abe96918414f90720515778ff45d49a6e9e206906bcecc78c1585f1c3d2a04916c74038b15a2cf005c7f23f0f0ed1d9103453a4f3198be5ac782c9cbf6970c7d2624fa9c0b026e712a48086223b950b78f4f262f1faaa84d99be17c79728c23c", 0x6f}, {&(0x7f0000001240)="372e4ef857d370a2eecc3715e7669cff938febf4b1c4d72d181e3e656b3aaf0520275a5ee57ae27f32e0fe09e68ed6f41e8df0f77484c133f51627d80707c1d62e7c79419d576a2706a16facc3af8b287ef3200a68486c34d71edad7b06dac6ada6eb5", 0x63}, {&(0x7f00000012c0)="294896298686eae19445e0ae38099842fd1fea602f1d08a4affae4346078c18b285e", 0x22}, {&(0x7f0000001300)="27701c939d8a0ea6b0219f96b831dec5ae6d7fa82a34bdaaf17336d6d5f23abc7c0294ad88d8a999c25d8d658e2fde1b678c82c1ef7998a85d863cc027480c83d932f6293fc9148254515df1eb1b42417b1e8256c3c8b6d59fee8ff403ddb85a0faed9d8e059a27451bf00403f8db8a7e60c1aab585e68093bad1a2cb25a613a1d42601aff03c2dd11638f2b99a1f324b75e08fef9d5bbb8457eeb24a81004078e0f62688cbbed3c4b4d2ee2c7862b26b9fece3a56d0ea639f51401bc9f1139e19a0d89590d0081f0050eff7c4", 0xcd}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000002400)="6d8606464b33e7e0abbe680064d15b75162a80223d578732cf9f6a3cd7233b2879eecbc608aa62c21a41ca7ea6dff48ff574dfe0455f6a72a65acc7dbadf2600e7b01fa843962fcde337624ff0781629243187ec3ff5e9026eb642b778ebc85483cfc9c8e511a62cf04ef7bf5b53c9b7da16779fc1c42036fe3012face42972fff974a840f7cf7ff15e70eb2ebb245e0c2d1d8d000eb3b3a652f7f5e562aba1345f3c5eae0", 0xa5}, {&(0x7f00000024c0)="67d8046dd202d292b7c1104f988e8e282817fdca241c734728d2f3a719419297a42a07a0382895a54b087f3a111ed6a3f9c0ba7fa82eda2141f5124a1ca1a7d47da0bb324e4443f3379457162609d9d66f9f6172a7f7c1c3a0f60db46a4025108245c341ab1ada6bdff68820eba7e6d1fa1f961fb50736d72dee7d8d1e0c8daccad01c888dff7cdc6c1f21da169594f7093a000b84a9105a37385d817c6b21e307476cdc4bd9ab3188ad710b645d153b2f894896640186a59b5f65e8d6d26ee41828e50cced013bd171863561eed26fef461b74acc79d8", 0xd7}], 0xa, 0xd) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xa100, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x30, &(0x7f0000002f80)={0x0, {{0xa, 0x4e24, 0x0, @mcast1}}}, 0x84) accept4$vsock_stream(r1, &(0x7f0000002640)={0x28, 0x0, 0x2711, @host}, 0x10, 0x0) 04:04:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x14bf8, @loopback}, 0x1c) 04:04:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0xffffffeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 228.890749] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:23 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xffffffff00000000, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:24 executing program 1: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xffffffff, 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x402008007e, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6f, "d43f23", "8ab80b0dbd5966534193f13f5596da9758d71988d0326bb99883d083c9237c3e9320f049eef8ca5a16e94956cc75e2860a357f555728a05b8d6e823658598f004ea4bb49381f097f199a85e5a0e3be235f307129fe38ad4b005bd1a55524161863d26f3988e7e995eaeaff58c734464d50b3bd69f65784dc5d42258292dd51ae2e0a343fa3e8cab66d5cd5917bbfb6cb3c83c92b74dcb0007f81d606d19d96ec2ee9ef2d391482a5b560b82ab4b217edcf44c248da30dbe03927d4f1e2e574021d1ed377268bcd964ad5d03613a347eca0cc8909f97d8bf01276ada45a78af7809f11aee51da15e93d1a40c605a217f706145145c3e6cc949e36f1581389f54e"}}, 0x110) 04:04:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000007fffff"], 0x1}}, 0x0) 04:04:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getuid() r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/exec\x00') getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000680)='limits\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 04:04:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xf2ffffff00000000}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 229.025772] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff00, @loopback}, 0x1c) 04:04:24 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xebffffff, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:24 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0xfffffff2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:24 executing program 1: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xffffffff, 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x402008007e, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6f, "d43f23", "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"}}, 0x110) 04:04:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4000000000000000, @loopback}, 0x1c) 04:04:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xf3ffffff00000000}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) [ 229.266772] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:24 executing program 3: r0 = socket$inet6(0xa, 0x4, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) socket$inet6(0xa, 0x80000, 0x2) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffd000/0x2000)=nil) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, &(0x7f00000001c0)=0x100000, 0x8001) [ 229.359427] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote}, 0xfcc9) sendto$inet6(r0, &(0x7f0000000080)="a9", 0x1, 0x234e, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 04:04:24 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xfffffff3, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xe9ffffff00000000}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfffe53f3, @loopback}, 0x1c) 04:04:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:24 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xf3ffffff, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x9d5dfeff, @loopback}, 0x1c) 04:04:24 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xffffffe9, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:24 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xfffffff3}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) [ 229.677210] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 229.703756] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:24 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x11) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc}, 0x10) r1 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @rand_addr}}, 0x9, 0x6614, 0x19, 0x7, 0xbe}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r2, @in={{0x2, 0x4e21, @local}}, 0x100}, &(0x7f0000000300)=0x88) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000340)=@req={0x3fc, 0x0, 0x0, 0xfffffffffffffff7}, 0x10) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x8003, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r3, 0xc008551a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000014000000f7ffffff0300367cdf8a00000200000001002000"]) sendmsg$netlink(r1, &(0x7f00003aefc8)={0x0, 0xffffffffffffff73, &(0x7f0000847000), 0x1f2, &(0x7f000048a000)}, 0x0) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000100), &(0x7f0000000140)) sendmmsg$alg(r1, &(0x7f0000008fc0)=[{0x0, 0x1000000, &(0x7f00000030c0), 0x0, &(0x7f0000003100)}], 0x1, 0x0) close(r0) 04:04:24 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xf2ffffff00000000, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20000000000003, 0x0) recvmsg$kcm(r0, &(0x7f00000018c0)={&(0x7f00000002c0)=@can, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/96, 0x60}, {&(0x7f0000002980)=""/4096, 0x1000}], 0x2, &(0x7f0000000040)=""/45, 0x2d}, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0x1240) write(r0, &(0x7f00000000c0)="220000005e000721004f10f7d0ebd900000000003c0253573d9a047c26485a3d5728", 0x22) 04:04:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x104a010000000000, @loopback}, 0x1c) 04:04:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfe80, @loopback}, 0x1c) 04:04:24 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xe9ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xffffffe9}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:25 executing program 1: r0 = socket$inet6(0xa, 0x4, 0xe7) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'tunl0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@loopback, 0x2f, r1}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000013000502000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000000000000c00180008000000"], 0x28}}, 0x0) [ 229.994223] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 230.020989] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe, @loopback}, 0x1c) 04:04:25 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xe9ffffff, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:25 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xebffffff, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000ffff"], 0x1}}, 0x0) 04:04:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200, 0xebffffff00000000}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:25 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0xffffffffffffffff) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000040)=0xffff, 0x4) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000002480)=""/112, 0x70}}], 0x1, 0x10161, &(0x7f0000001280)={0x0, 0x989680}) 04:04:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x20000000, @loopback}, 0x1c) [ 230.178127] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 230.209483] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000007fff"], 0x1}}, 0x0) 04:04:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xe9ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup3(r0, r1, 0x80000) write$eventfd(r2, &(0x7f0000000080)=0x4, 0x8) r3 = eventfd(0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f00000015c0)={r3}) r5 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r5}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r3}) 04:04:25 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xe9ffffff, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 230.306082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 230.340563] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfe80000000000000, @loopback}, 0x1c) 04:04:25 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x1, 0x80}) 04:04:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000f000"], 0x1}}, 0x0) 04:04:25 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xf2ffffff, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa00000000000000, @loopback}, 0x1c) [ 230.492234] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xffffffe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:25 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xffffffeb, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfec0000000000000, @loopback}, 0x1c) 04:04:25 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x2) fcntl$addseals(r0, 0x409, 0x4) write$cgroup_int(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="a0fea12b740acdd9fa35873333145b7a65ecedf2a980310fdf17564f354432565a1ba9cc87299c4482b412d717b1e902f8a91e471c5e870da524a0aa193e411905b0bef0f33807807bb0c12d349da388f0b918db109582982540d6739e000000009bdca86d51b7f81043b9bb9b57d6e776b85a7ccdfc4098a74103e963ff1d3f122614bd1b64a6a3cd356514289e34b02a583ebf904d842bae85976ddd6eb475ab18688b8dbab2"], 0x1) ftruncate(r0, 0x800000) [ 230.604819] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x8dffffff, @loopback}, 0x1c) 04:04:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup3(r0, r1, 0x80000) write$eventfd(r2, &(0x7f0000000080)=0x4, 0x8) r3 = eventfd(0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f00000015c0)={r3}) r5 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r5}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r3}) [ 230.738920] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:25 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xffffffeb, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:25 executing program 1: eventfd2(0x7, 0x800) r0 = socket$inet(0x2, 0x3, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x101, 0x101201) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x2}, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @rand_addr=0x8}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x44, {0x2, 0x4e22, @remote}, 'ifb0\x00'}) 04:04:25 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xfffffff2, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xffffffeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000f0"], 0x1}}, 0x0) [ 230.833972] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:26 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xfffffff3, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) 04:04:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa00000000000000, @loopback}, 0x1c) 04:04:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xfffffff2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfec0, @loopback}, 0x1c) 04:04:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000ffff"], 0x1}}, 0x0) 04:04:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2000000, 0x0, 0x9}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x1ee, 0x47cfa15f8225369) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1, 0x88000) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000280)={@dev, @loopback, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f00000004c0)={@empty, r3}, 0x14) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000340)=ANY=[@ANYBLOB="09020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000b7e7cae50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb000000000000000000000000000000000000000000000000000000000000000000007ba4376182ce7e54000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)=0x0) bind$vsock_dgram(r2, &(0x7f0000000600)={0x28, 0x0, 0x2711, @host}, 0x10) r5 = syz_open_procfs(r4, &(0x7f0000000300)='fdinfo/3\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x5, 0x101000) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f0000000500)) lseek(r5, 0x0, 0x0) 04:04:26 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xf3ffffff00000000, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff0f0000, @loopback}, 0x1c) 04:04:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xebffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 231.101104] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 231.116941] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:26 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xebffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x700, @loopback}, 0x1c) 04:04:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000f0ff"], 0x1}}, 0x0) 04:04:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file2\x00', 0x40000, 0x100) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000680)={{0xa, 0x4e24, 0xffff, @mcast1, 0x35b}, {0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x18}, 0x5ec}, 0x100000001, [0xfffffffffffffffc, 0x4, 0x3, 0x8, 0x5268, 0x3, 0x1, 0x5]}, 0x5c) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000600)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='coredump_filter\x00') write$cgroup_pid(r1, &(0x7f0000000300), 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x3, 0x0, 0x75, 0x7f, 0x8}, &(0x7f00000001c0)=0x98) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req={0x7, 0x8000, 0x620, 0x2}, 0x10) mount(&(0x7f0000000280)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) umount2(&(0x7f0000000380)='./file0\x00', 0x0) r3 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0) syz_open_pts(r2, 0x488000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=0x1) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x82, 0x0) dup2(r3, r4) gettid() [ 231.269624] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 231.326180] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:26 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xf2ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x240, @loopback}, 0x1c) 04:04:26 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xe9ffffff00000000, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000f0"], 0x1}}, 0x0) 04:04:26 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2000000, 0x0, 0x9}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x1ee, 0x47cfa15f8225369) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1, 0x88000) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000280)={@dev, @loopback, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f00000004c0)={@empty, r3}, 0x14) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000340)=ANY=[@ANYBLOB="09020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000b7e7cae50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb000000000000000000000000000000000000000000000000000000000000000000007ba4376182ce7e54000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)=0x0) bind$vsock_dgram(r2, &(0x7f0000000600)={0x28, 0x0, 0x2711, @host}, 0x10) r5 = syz_open_procfs(r4, &(0x7f0000000300)='fdinfo/3\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x5, 0x101000) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f0000000500)) lseek(r5, 0x0, 0x0) 04:04:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x15554, @loopback}, 0x1c) [ 231.516327] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfc, @loopback}, 0x1c) 04:04:26 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 231.643916] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xf3ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 231.719620] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000ffff"], 0x1}}, 0x0) 04:04:26 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0xebffffff00000000, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:26 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x2) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000200)={"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"}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000000180)={{0x7ff}}) 04:04:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4000000000000000, @loopback}, 0x1c) 04:04:26 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xf3ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x51000000, @loopback}, 0x1c) 04:04:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xfffffff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000f0"], 0x1}}, 0x0) 04:04:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x3f, 0x4) write(r1, &(0x7f0000000080)="27008a151f750800390005000000000000000000000000000000db", 0x20) [ 231.936119] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 231.975751] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2000000, 0x0, 0x9}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x1ee, 0x47cfa15f8225369) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1, 0x88000) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000280)={@dev, @loopback, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f00000004c0)={@empty, r3}, 0x14) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000340)=ANY=[@ANYBLOB="09020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000b7e7cae50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb000000000000000000000000000000000000000000000000000000000000000000007ba4376182ce7e54000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) fcntl$getownex(r2, 0x10, &(0x7f0000000040)) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)=0x0) bind$vsock_dgram(r2, &(0x7f0000000600)={0x28, 0x0, 0x2711, @host}, 0x10) r5 = syz_open_procfs(r4, &(0x7f0000000300)='fdinfo/3\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x5, 0x101000) ioctl$LOOP_GET_STATUS(r5, 0x4c03, &(0x7f0000000500)) lseek(r5, 0x0, 0x0) 04:04:27 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xf3ffffff, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:27 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xffffffe9, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xf3ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4900, @loopback}, 0x1c) 04:04:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x300000000000000, @loopback}, 0x1c) 04:04:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000000)=@in={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000001100)=[{&(0x7f0000000080)="e1170521cf68a61d6920d06c05b58f20aa8b0ea1a13be733caf2ecf7ddcebf120fcdbe80dcfa824aad9cef31e76f59abf7efe6977d21302698468af94cffec21e85a57a8afeab773140fa436b0675655df2bb943c8c2cf776207f47cbc7c2135889838c21a7e85412bd31b8c4fc10e550916ba27015762b035e486802a87f1423ec74e029091a8a8bd251a1162a37e231af9e07c26668d9446d224cbe0b51e112cbd6d0c0c50a8d155842b16236a4360d4d5e4dc10261545fe497d4cd8ddb4bbc33c4551b597245c5b6dfc32ae90bc05187b0910b43a37dd7bbf133b7678a9ff376f7f6560bfb7b45a41b47c45c43dac0fae109f1ab94390cf463c18640d4ebb1264c1b41db568df0fed22af44c91a26cff73a187ec2701f6bc731547cef3bc92c6df2657fa5bc6b9f4921cfee8fc6b7eff55e8c824a3f5c9f8cd6b4c91fbbc9598f03cbba7ebc0d03b6c1ef931cfaaf93a2b86e4217bf609d8d3da877d88b86448646439229b4f3ca27650cf74777", 0x16f}], 0x1, &(0x7f0000001240)}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000c8020000bc000000000000007801000000000000bc000000340200003402000034020000340200003402000004000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0xfffffdd4) 04:04:27 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xffffffeb, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 232.231998] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 232.236606] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0xfffffffffffffe00, @remote, 0x4}, 0x1c) listen(r0, 0x4e4) r1 = socket$inet6_sctp(0xa, 0xffffffffffffffff, 0x84) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000380)={'team0\x00', r2}) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000200)=0x8) sendto$inet6(r1, &(0x7f0000000000)="f8", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x6, 0x10000) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000001680)={@mcast2}, &(0x7f00000016c0)=0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6, 0x0, 0x0, 0x8000, 0x0, 0x11}, 0x98) write$P9_RWALK(r3, &(0x7f0000000040)={0x16, 0x6f, 0x2, {0x1, [{0x82, 0x4}]}}, 0x16) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0xffffffffffffffe9) 04:04:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xe9ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:27 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000009eff"], 0x1}}, 0x0) 04:04:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4900, @loopback}, 0x1c) 04:04:27 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfffffff2, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xb9743e2, @loopback}, 0x1c) [ 232.506588] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 232.543006] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:27 executing program 3: unshare(0x2000400) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000000c0)='bond_slave_1\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') setns(r1, 0x0) 04:04:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000ffff"], 0x1}}, 0x0) 04:04:27 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1ec, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xf2ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:27 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xebffffff00000000, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfd85710b00000000, @loopback}, 0x1c) 04:04:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x900000000000000, @loopback}, 0x1c) 04:04:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:27 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 232.748797] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 232.810076] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:28 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x15, 0x5, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) r2 = gettid() sendto$inet(r1, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x7}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000001080)={{}, {0x0, 0x1c9c380}}, &(0x7f00000010c0)) getdents(r1, &(0x7f0000000000)=""/32, 0x20) dup2(r0, r1) tkill(r2, 0x1000000000016) 04:04:28 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0xebffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe8030000, @loopback}, 0x1c) 04:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:28 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xebffffff, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfd85710b00000000, @loopback}, 0x1c) 04:04:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x800000000000000, @loopback}, 0x1c) [ 233.262752] syz-executor1 (16947) used greatest stack depth: 14504 bytes left 04:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000000200"], 0x1}}, 0x0) [ 233.316108] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 233.340466] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:28 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf2ffffff, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xf2ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 233.394294] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa00, @loopback}, 0x1c) 04:04:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4002, @loopback}, 0x1c) 04:04:28 executing program 3: r0 = socket$inet(0x2, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0xa, &(0x7f00000001c0)=[{0x10000, 0x6, 0x7, 0x7}, {0x1, 0x2, 0x401, 0xfffffffffffff800}, {0x8, 0x3, 0x687, 0x1}, {0x1, 0x4, 0x0, 0x6}, {0x7, 0x7, 0x100000001, 0x87cd}, {0x7, 0x1ff, 0xffffffffffffff80, 0x9}, {0xfa, 0x9, 0x7, 0x5}, {0x1, 0x4, 0x2b}, {0x3, 0xcc4, 0xfffffffffffffffd, 0xfffffffffffffc00}, {0x5, 0x7, 0x7, 0x6}]}, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r3 = request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)='eth1ppp0bdevkeyring)\x00', 0x0) keyctl$get_persistent(0x16, r2, r3) sendto$inet(r0, &(0x7f0000000000)="f1", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) 04:04:28 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xe9ffffff, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000ff"], 0x1}}, 0x0) [ 233.556193] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x10000000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x200100, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000080000000200000000000100000000000000ed00fbffffff00000000ff09000000000000"]) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x1}], 0x2000000000000092) 04:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) [ 233.614572] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x50000, @loopback}, 0x1c) 04:04:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff00000000000000, @loopback}, 0x1c) 04:04:28 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xebffffff, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:28 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000580)=[{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000300), 0x0, &(0x7f0000000500)=[@rights={0x1c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r1]}], 0x1c}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/igmp\x00') getsockname$inet(r2, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f00000002c0)=0x10) getdents(r2, &(0x7f0000000200)=""/68, 0x44) 04:04:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x81, 0x400) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={0xffffffffffffffff, r1, 0x0, 0x2}, 0x10) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000200)=0x1) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x105082) prctl$setfpexc(0xc, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000400)=0xa) bind$rds(0xffffffffffffffff, &(0x7f0000000740)={0x2, 0x0, @remote}, 0x10) r4 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000240)=""/163) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r0, r3, &(0x7f00000ddff8)=0x2e00, 0x102000002) 04:04:28 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xfffffff3, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xffffffeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 233.799046] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x6, @loopback}, 0x1c) 04:04:28 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000f0"], 0x1}}, 0x0) 04:04:29 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf3ffffff00000000, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xfffffff2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x54550100, @loopback}, 0x1c) 04:04:29 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xe9ffffff00000000, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe803000000000000, @loopback}, 0x1c) 04:04:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000000000002"], 0x1}}, 0x0) [ 233.928685] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 234.039190] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 234.237275] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 234.271770] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf401000000000000, @loopback}, 0x1c) 04:04:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x6, 0x8000) pwrite64(r1, &(0x7f00000001c0), 0x0, 0x0) [ 234.455914] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000009e"], 0x1}}, 0x0) 04:04:29 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf2ffffff00000000, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xfffffff2, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xf3ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4000, @loopback}, 0x1c) 04:04:29 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000580)=""/168) r2 = add_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="35a3c29aaa50785f2536e64efbe4e177336720110999ec86a61a55e111678a7d42495562e988b9afd51bd3fb2f5225382bbb9211a94c2eebe771e45a3e11944cd1404f74f27ebf4309456e52b60353956a876c5d2f1d774b5c9ce759a6c8fda2248d884e43ebabd1c0656c9dd0280abb37759fde17939fc256e3794e89c361d1653ce4926b683a9b7c9f958ee748efdecf6301649bb98af30291d27dc8895f38948fdab7541afb7f305e86cd006d3de69ba9f8221e01c797094caff5dfaa8fb6ef2009cdf431458f6243413e44ee4985367c0f993487f5c4c96086bde7a875b555bc403cd4773a6d2780e8e0", 0xec, 0xfffffffffffffffa) request_key(&(0x7f0000000680)='syzkaller\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000700)='\x00', r2) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)=@known='security.capability\x00', &(0x7f0000000440), 0x0, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x2) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f00000003c0)={0x5, 0x200}) munlockall() getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000400), &(0x7f0000000440)=0x4) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x282000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0e05403, &(0x7f0000000480)={{0x0, 0x0, 0x5, 0x0, 0x10001}, 0x1, 0x2, 'id0\x00', 'timer0\x00', 0x0, 0x3f, 0x2641, 0x7, 0xc08}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x6, @local, 0x0, 0x4, "64680000f0ff7c97ac76b6eecbfa00", 0x4}, 0x2c) recvmmsg(r5, &(0x7f00000054c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000740)=""/158, 0x9e}], 0x1, &(0x7f0000000800)=""/155, 0x9b, 0x9}}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000940)=""/201, 0xc9}, {&(0x7f0000000a40)=""/251, 0xfb}, {&(0x7f0000000b40)=""/125, 0x7d}, {&(0x7f0000000bc0)=""/230, 0xe6}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0x3}, 0x9}, {{&(0x7f0000001cc0)=@llc, 0x80, &(0x7f0000001fc0)=[{&(0x7f00000006c0)=""/33, 0x21}, {&(0x7f0000001d40)=""/39, 0x27}, {&(0x7f0000001d80)=""/23, 0x17}, {&(0x7f0000001dc0)=""/30, 0x1e}, {&(0x7f0000001e00)=""/184, 0xb8}, {&(0x7f0000001ec0)=""/245, 0xf5}], 0x6, &(0x7f0000002000)=""/245, 0xf5, 0xfffffffffffffe00}, 0x7}, {{&(0x7f0000002100)=@generic, 0x80, &(0x7f0000002480)=[{&(0x7f0000002180)=""/115, 0x73}, {&(0x7f0000002200)=""/130, 0x82}, {&(0x7f00000022c0)=""/65, 0x41}, {&(0x7f0000002340)=""/237, 0xed}, {&(0x7f0000002440)=""/37, 0x25}], 0x5, &(0x7f00000024c0)=""/162, 0xa2, 0x8}}, {{&(0x7f0000002580)=@rc, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002600)=""/176, 0xb0}, {&(0x7f00000026c0)=""/236, 0xec}], 0x2, &(0x7f0000002800)=""/250, 0xfa, 0x5}, 0x3f}, {{&(0x7f0000002900)=@ax25, 0x80, &(0x7f0000003b40)=[{&(0x7f0000002980)=""/155, 0x9b}, {&(0x7f0000002a40)}, {&(0x7f0000002a80)=""/112, 0x70}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/31, 0x1f}], 0x5, &(0x7f0000003b80)=""/206, 0xce, 0x9}, 0x7}, {{&(0x7f0000003c80)=@nfc, 0x80, &(0x7f0000004ec0)=[{&(0x7f0000003d00)=""/91, 0x5b}, {&(0x7f0000003d80)}, {&(0x7f0000003dc0)=""/53, 0x35}, {&(0x7f0000003e00)=""/74, 0x4a}, {&(0x7f0000003e80)=""/4096, 0x1000}, {&(0x7f0000004e80)=""/58, 0x3a}], 0x6, &(0x7f0000004f00)=""/219, 0xdb, 0x9}, 0x9}, {{&(0x7f0000005000)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000005480)=[{&(0x7f0000005080)=""/105, 0x69}, {&(0x7f0000005100)=""/195, 0xc3}, {&(0x7f0000005200)=""/41, 0x29}, {&(0x7f0000005240)=""/133, 0x85}, {&(0x7f0000005300)=""/58, 0x3a}, {&(0x7f0000005340)=""/1, 0x1}, {&(0x7f0000005380)=""/236, 0xec}], 0x7, 0x0, 0x0, 0x7}, 0xb58c}], 0x8, 0x0, &(0x7f00000055c0)={0x0, 0x989680}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/snapshot\x00', 0xa6101, 0x0) clone(0xfffffffffffffffe, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000040), &(0x7f0000cd6f68)) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x90) 04:04:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000001040)='/dev/ion\x00', 0x10600, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001240)="c3401c344654f3c7d9fe1ba48c8e399aa4eedca876e2f67cfa6446ff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d01051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x1, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x70}}], 0x1, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) recvfrom(r0, &(0x7f0000000040)=""/4096, 0xfffffffffffffff7, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001400)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000001200)) r1 = gettid() tkill(r1, 0x16) 04:04:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfec0, @loopback}, 0x1c) 04:04:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xf3ffffff00000000, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 234.777096] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 234.797180] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xe9ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:29 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xe9ffffff, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x3e8, @loopback}, 0x1c) 04:04:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xffffffc2, @loopback}, 0x1c) 04:04:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xf2ffffff00000000, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) [ 235.000725] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xebffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 235.066645] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xf3ffffff, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4, @loopback}, 0x1c) 04:04:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x3, @loopback}, 0x1c) [ 235.313567] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x9, @loopback}, 0x1c) [ 235.535677] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2c5, 0x80000) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) renameat2(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x5) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, "57db51e49db17aa9b7d62b7eee603f1d56fb62521fb25a3e6b760e2d136aa859638434092df7e9d2f3c60b15304febc9392d839e4f2ad434c454d5a8177bc3f940997f27a50200"}, 0x7c) rt_sigreturn() fcntl$setstatus(r0, 0x4, 0x2000) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) 04:04:30 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000580)=""/168) r2 = add_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="35a3c29aaa50785f2536e64efbe4e177336720110999ec86a61a55e111678a7d42495562e988b9afd51bd3fb2f5225382bbb9211a94c2eebe771e45a3e11944cd1404f74f27ebf4309456e52b60353956a876c5d2f1d774b5c9ce759a6c8fda2248d884e43ebabd1c0656c9dd0280abb37759fde17939fc256e3794e89c361d1653ce4926b683a9b7c9f958ee748efdecf6301649bb98af30291d27dc8895f38948fdab7541afb7f305e86cd006d3de69ba9f8221e01c797094caff5dfaa8fb6ef2009cdf431458f6243413e44ee4985367c0f993487f5c4c96086bde7a875b555bc403cd4773a6d2780e8e0", 0xec, 0xfffffffffffffffa) request_key(&(0x7f0000000680)='syzkaller\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000700)='\x00', r2) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)=@known='security.capability\x00', &(0x7f0000000440), 0x0, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4000, 0x2) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f00000003c0)={0x5, 0x200}) munlockall() getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000400), &(0x7f0000000440)=0x4) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x282000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0e05403, &(0x7f0000000480)={{0x0, 0x0, 0x5, 0x0, 0x10001}, 0x1, 0x2, 'id0\x00', 'timer0\x00', 0x0, 0x3f, 0x2641, 0x7, 0xc08}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000040)={0x6, @local, 0x0, 0x4, "64680000f0ff7c97ac76b6eecbfa00", 0x4}, 0x2c) recvmmsg(r5, &(0x7f00000054c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000740)=""/158, 0x9e}], 0x1, &(0x7f0000000800)=""/155, 0x9b, 0x9}}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000940)=""/201, 0xc9}, {&(0x7f0000000a40)=""/251, 0xfb}, {&(0x7f0000000b40)=""/125, 0x7d}, {&(0x7f0000000bc0)=""/230, 0xe6}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x5, 0x0, 0x0, 0x3}, 0x9}, {{&(0x7f0000001cc0)=@llc, 0x80, &(0x7f0000001fc0)=[{&(0x7f00000006c0)=""/33, 0x21}, {&(0x7f0000001d40)=""/39, 0x27}, {&(0x7f0000001d80)=""/23, 0x17}, {&(0x7f0000001dc0)=""/30, 0x1e}, {&(0x7f0000001e00)=""/184, 0xb8}, {&(0x7f0000001ec0)=""/245, 0xf5}], 0x6, &(0x7f0000002000)=""/245, 0xf5, 0xfffffffffffffe00}, 0x7}, {{&(0x7f0000002100)=@generic, 0x80, &(0x7f0000002480)=[{&(0x7f0000002180)=""/115, 0x73}, {&(0x7f0000002200)=""/130, 0x82}, {&(0x7f00000022c0)=""/65, 0x41}, {&(0x7f0000002340)=""/237, 0xed}, {&(0x7f0000002440)=""/37, 0x25}], 0x5, &(0x7f00000024c0)=""/162, 0xa2, 0x8}}, {{&(0x7f0000002580)=@rc, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002600)=""/176, 0xb0}, {&(0x7f00000026c0)=""/236, 0xec}], 0x2, &(0x7f0000002800)=""/250, 0xfa, 0x5}, 0x3f}, {{&(0x7f0000002900)=@ax25, 0x80, &(0x7f0000003b40)=[{&(0x7f0000002980)=""/155, 0x9b}, {&(0x7f0000002a40)}, {&(0x7f0000002a80)=""/112, 0x70}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/31, 0x1f}], 0x5, &(0x7f0000003b80)=""/206, 0xce, 0x9}, 0x7}, {{&(0x7f0000003c80)=@nfc, 0x80, &(0x7f0000004ec0)=[{&(0x7f0000003d00)=""/91, 0x5b}, {&(0x7f0000003d80)}, {&(0x7f0000003dc0)=""/53, 0x35}, {&(0x7f0000003e00)=""/74, 0x4a}, {&(0x7f0000003e80)=""/4096, 0x1000}, {&(0x7f0000004e80)=""/58, 0x3a}], 0x6, &(0x7f0000004f00)=""/219, 0xdb, 0x9}, 0x9}, {{&(0x7f0000005000)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000005480)=[{&(0x7f0000005080)=""/105, 0x69}, {&(0x7f0000005100)=""/195, 0xc3}, {&(0x7f0000005200)=""/41, 0x29}, {&(0x7f0000005240)=""/133, 0x85}, {&(0x7f0000005300)=""/58, 0x3a}, {&(0x7f0000005340)=""/1, 0x1}, {&(0x7f0000005380)=""/236, 0xec}], 0x7, 0x0, 0x0, 0x7}, 0xb58c}], 0x8, 0x0, &(0x7f00000055c0)={0x0, 0x989680}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/snapshot\x00', 0xa6101, 0x0) clone(0xfffffffffffffffe, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000040), &(0x7f0000cd6f68)) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x90) 04:04:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xffffffe9, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000007f"], 0x1}}, 0x0) 04:04:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xe9ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:30 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xf3ffffff, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x1802000000000000, @loopback}, 0x1c) [ 235.605984] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x801000d2, @loopback}, 0x1c) [ 235.672196] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:30 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000140)={0xbf, @tick, 0x0, {0x0, 0x7}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x80045301, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x9, 0x1) tkill(r3, 0x1000000000013) timer_settime(r4, 0x1, &(0x7f00000000c0)={{0x77359400}}, 0x0) 04:04:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000ff"], 0x1}}, 0x0) 04:04:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x20000, @loopback}, 0x1c) 04:04:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xebffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xffffffeb, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 235.812773] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:30 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xffffffe9, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000f0"], 0x1}}, 0x0) [ 235.939984] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x1802000000000000, @loopback}, 0x1c) [ 236.047032] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x7000000, @loopback}, 0x1c) [ 236.184010] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:31 executing program 1: timer_create(0xffbffffffffffff1, &(0x7f0000000380)={0x0, 0x20, 0x0, @thr={&(0x7f0000000080), &(0x7f0000000140)}}, &(0x7f0000000400)) clock_getres(0x3, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0xffffffffffffffff, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, r0}}, 0x0) 04:04:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x104a0100, @loopback}, 0x1c) 04:04:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x9000000, @loopback}, 0x1c) 04:04:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xffffffe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0xe9ffffff00000000, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:31 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xffffffeb, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 236.434775] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 236.451577] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup3(r1, r0, 0x80000) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000080)={0x5, 0x1ff, 0x5dde}) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)={0x4, 0xff, 0xb2, 0x883, 0x80000000, 0x9, 0x40, 0x7, 0x4e, 0x7, 0x9}) ioctl$KVM_SIGNAL_MSI(r1, 0xc00caee0, &(0x7f00000000c0)={0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x60000]}) 04:04:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xf3ffffff, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:31 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xfffffff2, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff0f, @loopback}, 0x1c) 04:04:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) ioprio_set$uid(0x0, r1, 0x200000000000000) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r2, &(0x7f0000000200), 0x20020, 0x0, &(0x7f00000002c0)=@ethernet={0x0, @remote}, 0x80) 04:04:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe803, @loopback}, 0x1c) [ 236.742711] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 236.777924] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:31 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x10000) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000040)=""/246, &(0x7f00000001c0)=0xf6) clock_getres(0xdfeffffffffffff2, &(0x7f0000000140)) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', 'self\x00'}) 04:04:31 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xffffffff00000000, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xaaaa, @loopback}, 0x1c) 04:04:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xfffffff2, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0xf3ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfe80, @loopback}, 0x1c) 04:04:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) [ 236.998476] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000240)={0x3, 0x40, 0x5, 0x1, 0x3, 0x2, 0x5, 0x70d, 0x6, 0xfffffffffffffe00}) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x1, 0x0, &(0x7f0000000140)="14"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x4c, 0x0, &(0x7f0000000000)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f0000000200)}}}], 0x0, 0x0, &(0x7f0000000300)}) 04:04:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xebffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfffe5d9d, @loopback}, 0x1c) [ 237.104138] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:32 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rfkill\x00', 0x400000000020001, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f000319", 0x7}], 0x1) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x3) 04:04:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000ff"], 0x1}}, 0x0) [ 237.170634] binder: 17435 RLIMIT_NICE not set [ 237.218688] binder: 17435 RLIMIT_NICE not set 04:04:32 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0xebffffff00000000, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 237.246576] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe00, @loopback}, 0x1c) 04:04:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 237.299180] binder: BINDER_SET_CONTEXT_MGR already set [ 237.314670] binder: 17434:17442 ioctl 40046207 0 returned -16 04:04:32 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rfkill\x00', 0x400000000020001, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="0bd2430f000319", 0x7}], 0x1) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x3) [ 237.344716] binder: 17435 RLIMIT_NICE not set 04:04:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2000000000000, @loopback}, 0x1c) 04:04:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xffffffe9, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 237.383473] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 237.385657] binder_alloc: 17434: binder_alloc_buf, no vma [ 237.399212] binder: 17434:17452 transaction failed 29189/-3, size 0-0 line 2970 [ 237.401205] binder: release 17434:17442 transaction 11 out, still active [ 237.414087] binder: undelivered TRANSACTION_COMPLETE 04:04:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:32 executing program 3: io_setup(0x8, &(0x7f0000000100)) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100, 0x10000) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)={0xb1, 0x100000001, 0x6, "08e3c99dc741a29f9d5fc349b82d9aae2ba5183dbaad860e5940c9271146970dba449d47109869783620d7c476b99391380f6ef8ec5ca15b62edcf478edd13a04c54d07f8d87178c82298c0423241542284c8995c897a2ed2291a7160513663a1814807509439897c2b140e11141644b58f01cfe0a735a4d47246619cfd3e3292b944978e7876222865e2b2b7d25ee47a395b6978fbdd7067b04e12d4016dcc46d3d11b8e571a00d2bc3a9e9547712c9e7"}) move_pages(0x0, 0x206, &(0x7f0000000080)=[&(0x7f0000ffc000/0x2000)=nil], 0x0, &(0x7f0000000040), 0x0) 04:04:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xf3ffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 237.461179] binder: release 17434:17435 transaction 11 in, still active [ 237.468358] binder: send failed reply for transaction 11, target dead [ 237.532549] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 237.560156] binder: undelivered TRANSACTION_ERROR: 29189 04:04:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) nanosleep(&(0x7f0000000080), &(0x7f00000000c0)) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x1d, &(0x7f0000000040), &(0x7f0000000000)=0x4) 04:04:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000000000ff"], 0x1}}, 0x0) 04:04:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x51, @loopback}, 0x1c) 04:04:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x80301000, @loopback}, 0x1c) 04:04:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xe9ffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='loginuid\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0xfffffffffffffff5, 0x4, {0x7, 0x1b, 0x1, 0x80, 0x4, 0x1872, 0x40, 0xfffffffffffffff9}}, 0x50) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18}, 0x18) 04:04:32 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xf2ffffff, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) iopl(0xffffffffffffff7c) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1040000, 0xfffffffffffffffd) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000100)=""/79) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) r2 = getpgid(0xffffffffffffffff) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000180)={'raw\x00', 0xd2, "4962d9ede2030d73ca3ee76077e857085fc63e4a71162d3ba6cfd8d91b591e6a4accb7390669d527357cf2e76217e6ecb51f156306ee401e165dc0af5c38b2802582e044273f36c093803e9e85decbb21f1dadb6d8f87bd40f52a87e0af03e6a9076f1ea884d6ff96ba5331ba2af0f9b772cf00f22f0972be60604d181d047a31c6711edfd320d900cd6f2e005259c4281cee096cadb5b33043b2c0685b01756216918de19626079f24e7f3654054c08a672def923ca0bcda3f8fe3177d559854b06e007e16c5293230fb8ac7005b70c65bd"}, &(0x7f0000000080)=0xf6) timer_create(0x7, &(0x7f00000000c0)={0x0, 0xc, 0x7, @thr={&(0x7f0000000280)="db010050b6c2b374ecf8611f81be3bc9c85dba5b072e071803c161bd878cde4ed439f65a666f23eb99e4c58e67b99c8096788e9448f93217ae888e5146a416ba56d18eb1a581e6d233431e12be5dd112783d769e4079238484084c218b24a7e8d3e88cec9fa35355e4e6b2c13c89f85cf6f46b12f726e044343d9f67c6232ee93dd85a5d7eb08ead47101e95629f98c7bc2b0b0e9bcf3f1401b326c86a", &(0x7f0000000340)="3a35ef0dc522ae1ee8e3964b6a45e1ad467721b9d1507a5435787b4479d5382f60110364c12bb314f11d9e2b6a5e7616812dbdce5493cd19c34b5d16ad5660f12ea7aec7d84478ebb7192dbc3df39014a5d49b78302dbf45008c2d30d1675d38f1f7e4a776d988bf51af364af32b0db4ecbadab881a502f9e442aa09efcc039acee50058d0c7"}}, &(0x7f0000000400)) getpgrp(r2) tkill(r2, 0xc) 04:04:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xffffffeb, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) [ 237.789296] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 237.824050] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x8, &(0x7f0000000000)={&(0x7f00001ee000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f00001ef000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0xc) 04:04:32 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffff2, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00004b4000/0x2000)=nil, 0x2000}, 0x1}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000007c0)={{&(0x7f00004b4000/0x1000)=nil, 0x1000}, 0x1}) 04:04:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf4010000, @loopback}, 0x1c) 04:04:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xffffffe9, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xebffffff00000000, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5100000000000000, @loopback}, 0x1c) 04:04:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) 04:04:33 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3000000000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r1, 0x90, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e24, 0x6, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffffffffffff7, @mcast2, 0x7cfd}, @in6={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x1a}, 0x9}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e23, 0x6, @local, 0x8001}]}, &(0x7f00000001c0)=0xc) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000200)={0x1, 0x40, 0x81}, 0xc) write$binfmt_elf32(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffff7, 0x6, 0x5, 0x4, 0xfffffffffffffff8, 0x3, 0x6, 0x4, 0x2c5, 0x38, 0x135, 0xff, 0x5, 0x20, 0x1, 0xaad, 0x80000001, 0x1}, [{0x6474e553, 0x8, 0x5bcc, 0x0, 0x7, 0x0, 0x7, 0x2}, {0x1, 0x10001, 0x3, 0x2, 0xdf67, 0x100000001, 0x80, 0x5}], "3a3f2215d342e37e3b0aeaef84355584e217e1792f2cf43db919d140edf977632e26310db39dd076b9c9073158672f5a10", [[], []]}, 0x2a9) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000500)=0x800, 0x4) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000540), &(0x7f0000000580)=0x4) r3 = syz_open_dev$adsp(&(0x7f00000005c0)='/dev/adsp#\x00', 0x3, 0x800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000600)={r1, @in={{0x2, 0x4e22}}, 0x400, 0x5, 0x1000, 0x4, 0x48}, &(0x7f00000006c0)=0x98) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000700)=0x100000) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000740)={r2, 0x1, 0x1}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000780)=@assoc_value={r2, 0x7}, &(0x7f00000007c0)=0x8) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000800)={0xffffffffffffffff}) getsockopt$inet_udp_int(r3, 0x11, 0x67, &(0x7f0000000840), &(0x7f0000000880)=0x4) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f00000008c0), &(0x7f0000000940)=0x60) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000a80)=0xe8) ioprio_get$uid(0x0, r6) r7 = gettid() ptrace$peekuser(0x3, r7, 0x0) connect(r0, &(0x7f0000000ac0)=@un=@abs={0x1, 0x0, 0x4e23}, 0x80) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r3, 0xc04c5349, &(0x7f0000000b40)={0x8, 0x20000000000, 0x6}) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000bc0)=@assoc_id=r4, &(0x7f0000000c00)=0x4) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000d80)={r0, &(0x7f0000000cc0)="6f35e78588773195c0f943e789dddab74ea2b78192ac33775da700024a9ce40a7f9f37491021e1ebe17a0208fb2b988cabd21d6a7cad78265dfe3f325597042c362cb9af325bd5985404a1bfd63b02f232a477", &(0x7f0000000d40)=""/10}, 0x18) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f0000000dc0), 0x1) fgetxattr(r5, &(0x7f0000000e00)=@random={'btrfs.', '/dev/adsp#\x00'}, &(0x7f0000000e40)=""/131, 0x83) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, &(0x7f0000000f00)=""/211) write$P9_RREADDIR(r3, &(0x7f0000001000)={0x68, 0x29, 0x1, {0x8, [{{0xe61b6947a5f27853, 0x1, 0x1}, 0x200, 0x8, 0x7, './file0'}, {{0x4, 0x0, 0x1}, 0xfffffffffffffc01, 0x3, 0x7, './file0'}, {{0x4, 0x4, 0x4}, 0x7, 0x100, 0x7, './file0'}]}}, 0x68) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) ioctl$int_out(r3, 0x2, &(0x7f0000001080)) 04:04:33 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) umount2(&(0x7f0000000680)='./file0\x00', 0x0) [ 238.103863] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 238.128042] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x300000000000000, @loopback}, 0x1c) 04:04:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xf3ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x7ffff000}}, 0x0) 04:04:33 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0xc0000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$poke(0xffffffffffffffff, r3, &(0x7f0000000040), 0x6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) process_vm_readv(r3, &(0x7f0000001780)=[{&(0x7f00000000c0)=""/106, 0x6a}], 0x1, &(0x7f0000000000)=[{&(0x7f0000001800)=""/121, 0x79}, {&(0x7f0000000180)=""/60, 0x3c}, {&(0x7f0000001b00)=""/83, 0x53}], 0x2000000000000151, 0x0) r4 = fcntl$dupfd(r2, 0x0, r2) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000140)=0x8) 04:04:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf353feff00000000, @loopback}, 0x1c) 04:04:33 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0x7f, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffff0000, 0x4}, 0x1000000000c, 0x0, 0x0, 0x0, 0xffffffff9ea4485d, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000000000)) 04:04:33 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xebffffff00000000, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 238.300551] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xe9ffffff, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x8dffffff, @loopback}, 0x1c) 04:04:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x8400ae8e, &(0x7f00000000c0)) 04:04:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xfffffff2, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 238.393948] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8}}, 0x0) 04:04:33 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0xc0000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$poke(0xffffffffffffffff, r3, &(0x7f0000000040), 0x6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) process_vm_readv(r3, &(0x7f0000001780)=[{&(0x7f00000000c0)=""/106, 0x6a}], 0x1, &(0x7f0000000000)=[{&(0x7f0000001800)=""/121, 0x79}, {&(0x7f0000000180)=""/60, 0x3c}, {&(0x7f0000001b00)=""/83, 0x53}], 0x2000000000000151, 0x0) r4 = fcntl$dupfd(r2, 0x0, r2) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000140)=0x8) [ 238.518459] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5000000, @loopback}, 0x1c) 04:04:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xebffffff, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:33 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xf2ffffff00000000, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20000381}}, 0x0) 04:04:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xe9ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5000000, @loopback}, 0x1c) 04:04:33 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0xc0000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() ptrace$poke(0xffffffffffffffff, r3, &(0x7f0000000040), 0x6) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) process_vm_readv(r3, &(0x7f0000001780)=[{&(0x7f00000000c0)=""/106, 0x6a}], 0x1, &(0x7f0000000000)=[{&(0x7f0000001800)=""/121, 0x79}, {&(0x7f0000000180)=""/60, 0x3c}, {&(0x7f0000001b00)=""/83, 0x53}], 0x2000000000000151, 0x0) r4 = fcntl$dupfd(r2, 0x0, r2) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000140)=0x8) 04:04:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000280)=0xffffffffffffff93, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xffffffffffffffd1, 0x0, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/userio\x00', 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) mkdirat(r2, &(0x7f0000000300)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) sched_setscheduler(r3, 0x1, &(0x7f0000000080)) r4 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000240), &(0x7f0000000340)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) ioctl(r0, 0x1, &(0x7f0000000140)="bc2432e3dace5ef49041d882459a5655f08e97231bae85320c4ea7ff0c29f532680594f0e3d8edafe2449cb51751d4986048") tkill(r4, 0x15) 04:04:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xc0}}, 0x0) [ 238.782237] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 238.793400] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xf2ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:33 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:33 executing program 3: poll(&(0x7f0000000040)=[{}, {}, {}, {0xffffffffffffffff, 0x8}], 0x4, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f000000c000)={0x10, 0x34003}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000040)={0x20, 0x100000028, 0x821, 0x0, 0x0, {0x3}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @uid}]}]}, 0x20}}, 0x3) 04:04:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xaaaa0000, @loopback}, 0x1c) 04:04:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xfffffdef}}, 0x0) 04:04:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x40020000, @loopback}, 0x1c) 04:04:34 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xf3ffffff00000000, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xebffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') lseek(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) io_cancel(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0xfd, r0, &(0x7f0000000100)="2a5cce94aeb7c130600d79f2c5a5890dbe19324bbbd00cfd912445670f70265efca107406dda4d15d4c5da7ba5a8b484c73fc20477fcebed13885a1165ef10a015a916449234bf2bd3a8001152d97468cf6e655e15b7820a277a09e99168df746475f937ce6594fbbde131c8a25e87cf0e693519811728b2de2aa5f749d0827104ce3847c85986a69a91240034a4bcd8aa3dab5ea3b78c4dec867433bf81b7829ce0e1ed8ccfd738b6de9b9896f790272af944f730555ad2f334c32233a26677241523d249965ffdedc278c60f0935f5595dd2b0", 0xd4, 0x5, 0x0, 0x0, r0}, &(0x7f0000000200)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x410100, 0x0) 04:04:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xec0}}, 0x0) [ 239.058254] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xf2ffffff00000000, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 239.125958] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4000, @loopback}, 0x1c) 04:04:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfc00, @loopback}, 0x1c) 04:04:34 executing program 1: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @loopback}, 0x130) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000280)={0x78, 0x0, 0x5, {0xbd, 0x8, 0x0, {0x4, 0x5, 0x4, 0xef1, 0x4, 0xfffffffffffffffb, 0x9, 0x56, 0x46ae, 0xffffffffffffff01, 0xdb, r1, r2, 0x4, 0x2}}}, 0x78) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000140)={0x4, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x104) 04:04:34 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xe9ffffff00000000, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x33fe0}}, 0x0) 04:04:34 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000040)=""/1) 04:04:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 239.335288] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 239.341367] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x6c00000000000000, 0x4200000000004700}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='limits\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x420002, 0x14) ioctl$VT_ACTIVATE(r5, 0x5606, 0x1) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0xa) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000002380)={0x0, 0x5}, &(0x7f00000023c0)=0x8) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r3, &(0x7f0000000080)="42fc5ba54bb5d3f812", 0x9, 0x80000000000000, 0x0, 0x0, r7}, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x1) 04:04:34 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xffffffff00000000, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:34 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="95df159bde72184b2500000000000000000000220000a1e5e2aa673a771bb036f9c10000000000000000000000000000"]}) 04:04:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x80301000, @loopback}, 0x1c) 04:04:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) 04:04:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xffffffc4, @loopback}, 0x1c) 04:04:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xf3ffffff00000000, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:34 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4), 0x1c) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x6, 0x4) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06055c8, &(0x7f00000000c0)={0x6, 0xa9, {0x57, 0x1c8, 0x0, {0x1f, 0x7ff}, {0x1, 0x9dd7}, @cond=[{0x3, 0x7ff, 0x12, 0x6, 0x9, 0x4}, {0x9, 0x9, 0x8, 0x9, 0x80, 0x10000}]}, {0x57, 0x8, 0x0, {0x7, 0x4}, {}, @period={0x5a, 0x800, 0xf6, 0xb61, 0x8001, {0x6, 0x80, 0x1, 0xba6}, 0x9, &(0x7f0000000080)=[0x7fff, 0x8, 0x4, 0x1a6c, 0x80, 0x7, 0x3f, 0xfff, 0x7]}}}) sendmmsg(r0, &(0x7f0000005180)=[{{0x0, 0x0, &(0x7f0000001600)}}, {{&(0x7f00000016c0)=@in6={0xa, 0x4e21, 0x7fffffff}, 0x1c, &(0x7f0000001b80), 0x0, &(0x7f0000001c00)}}], 0x2, 0x0) [ 239.573005] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:34 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xf3ffffff, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xf}}, 0x0) [ 239.647037] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc4ffffff00000000, @loopback}, 0x1c) 04:04:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa, @loopback}, 0x1c) 04:04:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0xffffffeb, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:34 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xe9ffffff, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:34 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)="842df84a80fc90cfd51e7c08b045ae441a929b985e5b833309d90f563d3ec6949de0087e7b8f0e87ba41", 0x2a, 0xfffffffffffffff8) r2 = getuid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r1, r2, r3) sysfs$1(0x1, &(0x7f0000000440)='dns_resolver\x00') r4 = socket$inet6_sctp(0xa, 0x1, 0x84) keyctl$invalidate(0x15, r1) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000400)={'syzkaller0\x00', {0x2, 0x4e24, @local}}) getsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={0x0, 0x100000000}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000300)={r5, @in={{0x2, 0x4e22, @loopback}}, 0x0, 0x7f}, &(0x7f00000003c0)=0x88) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x133000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000240)={0x101ff, 0x3, 0xd004, 0x1000, &(0x7f0000fff000/0x1000)=nil}) [ 239.864575] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 239.888593] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0xe9ffffff00000000, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x8}, 0x0) 04:04:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4002, @loopback}, 0x1c) 04:04:35 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffff3, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:35 executing program 3: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f00009ad000)=0x1) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x4}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x9, 0x0, @time, {0x1}, {}, @note={0x39, 0x10000, 0x3, 0x273c, 0x7}}], 0x1c) mremap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000016000/0x4000)=nil) dup2(r1, r3) 04:04:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2000000000000000, @loopback}, 0x1c) 04:04:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x6c00000000000000, 0x4200000000004700}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='limits\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x420002, 0x14) ioctl$VT_ACTIVATE(r5, 0x5606, 0x1) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0xa) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000002380)={0x0, 0x5}, &(0x7f00000023c0)=0x8) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r3, &(0x7f0000000080)="42fc5ba54bb5d3f812", 0x9, 0x80000000000000, 0x0, 0x0, r7}, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000040)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x1) [ 240.402309] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 240.404923] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xffffffe9, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x20000381}, 0x0) 04:04:35 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xffffffe9, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x900, @loopback}, 0x1c) 04:04:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x801000d200000000, @loopback}, 0x1c) 04:04:35 executing program 3: rt_sigprocmask(0x0, &(0x7f000021f000)={0xfffffffffffffffe}, 0x0, 0x8) clone(0x0, &(0x7f000075cf53), &(0x7f000015dffc), &(0x7f0000b25ffc), &(0x7f0000923000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000064e000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00005ebff8)=0x1b80) fcntl$setsig(r0, 0xa, 0x12) fcntl$setownex(r0, 0xf, &(0x7f0000704000)={0x2}) recvmsg(r1, &(0x7f000095cfc8)={&(0x7f0000893ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r0, r1) tkill(0x0, 0x15) wait4(0x0, 0x0, 0x60000002, &(0x7f0000a94f70)) 04:04:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xfffffff3, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x33fe0}, 0x0) 04:04:35 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xffffffeb, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xfffffff2, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 240.624111] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 240.646376] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe00000000000000, @loopback}, 0x1c) 04:04:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xffed0200, @loopback}, 0x1c) 04:04:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x2}, 0x0) 04:04:35 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xebffffff, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 240.923441] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 240.942160] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:36 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0xffffffe9, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xf2ffffff00000000, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xfffffff2, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:36 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0xfffffdef}, 0x0) 04:04:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x6000000, @loopback}, 0x1c) 04:04:36 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0xec01, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff000000, @loopback}, 0x1c) [ 241.296953] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 241.325423] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000018c0)={&(0x7f00000002c0), 0xc, &(0x7f0000001880)={&(0x7f0000000040)=@newlink={0x2c, 0x10, 0x15, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_ADDRESS={0xc, 0x1, @broadcast}]}, 0x300}, 0x1, 0x0, 0x0, 0x10}, 0x0) 04:04:36 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x7ffff000}, 0x0) 04:04:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xe9ffffff00000000, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20300, 0x141) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0x86, "0425686bb1ca152a343f14a8327fd992112ff50a86baae8593e089074c91a791b68c78de9c68b41ea20d25c3f0bd51be055e367a6287a1ee8da990787ed99dca5556d47d861e898ece0a8142d6544c5e647760a830d2a57ec404e4abbeedba386a1c9564343cb90f888f1473d5e2c76f7455c1ea98697a2de033eeca6963554a37027226ca29"}, &(0x7f00000003c0)=0x8e) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000001440)={r2, 0x0, 0x5e, "22a23c106f242537d162b92751a8df62c681b0935944af64e50c24e30dc803fb5e762818e7ac0e17c8cf28700f3d457f7a465edf2c10a9134d836fc112be469013a5a3c1b2bd4b81c275c6b61af7005597353ff50938cec8e0316ceb6751"}, 0x66) bind$alg(r0, &(0x7f0000001740)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) r3 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffcbe, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820faeb995298992ea54c7beef915d56534c90c2", 0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x7fff, 0x400}, 0xc) sendmsg$alg(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001e00)="468f09b18aefcb6e19475b7aa34549410cde1c077c59fcca5f97dff2a8f07a89a1b8723caaf981f7b23a26667a9644fa8234d2381ec9c1a5635f4a7b6607b6b07d3fa2cbc1f93525e1adfdf86783906a6b97e8b9fbfac7d73884133bed3438d4231776bc1cd561e7", 0x241}], 0x1, &(0x7f0000000140)=[@op={0x10, 0x117, 0x3, 0x1}], 0x10}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005e00)=[{&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000016c0)=[{&(0x7f00000004c0)="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", 0xf47}], 0x1, &(0x7f0000001700)}], 0x1, 0x0) getpid() setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000100)={r2, 0xca}, 0x8) r4 = openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x800, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) poll(&(0x7f00000002c0), 0x0, 0x9e) epoll_create(0xff) ioctl$KVM_NMI(r1, 0xae9a) recvmmsg(r3, &(0x7f0000001a80)=[{{&(0x7f0000000340)=@pppol2tp, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f0000000540)=""/201, 0xc9}], 0x2, &(0x7f0000000700)=""/52, 0x34}}], 0x1, 0x0, &(0x7f0000001d00)={0x77359400}) 04:04:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xabbfdf69, @loopback}, 0x1c) 04:04:36 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x1ffffffeb}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xe9ffffff, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x300, @loopback}, 0x1c) 04:04:36 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x1fffffff2}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 241.577793] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 241.578451] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xebffffff00000000, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x500000000000000, @loopback}, 0x1c) 04:04:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) write(r2, &(0x7f0000000040)="23719c1433daae6c8ec83f10da202c5763d6bb71258a654fd1b42c2901083f4cffd6a935b099230cc21a1050ae300be3f7940eee9e6594e50c532ba8eeeac8b6e114", 0x42) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, &(0x7f00000015c0)={[], 0x0, 0x0, 0x0, 0x0, 0x1aa, 0x0, 0x0, [], 0xfff}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x1000, 0x0, 0x0, 0x7fffffff, 0x0, 0xe99]}) setsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000100)=0x2, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:04:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xebffffff, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:36 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0xec0}, 0x0) 04:04:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x500, @loopback}, 0x1c) 04:04:36 executing program 1: getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="624930b56d9f3acccfc54cf39857914fa1d339a019bd19c3ac92b00d5848fa2707b303b1886603c139d0109efd9a827c437804e0daa5026a0859eb26f0e9bed875cda341af0abdb22e007d15c93baf4d8ad09d39534ed47a1f7433c89165afc9c083e51616481aa07a276f0c9f6abdd87c3af9e2ad2b4bbc5c41a7a1c49a9fea9ef52e2da1c96d11ed7b81be819cc98f38d88dd0c8dc5aac29dcee8177b2b34d93"], 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x252, 0x82) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000340)={0x6, 0x43d, 0x1, 0x1, 0x800}) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f00000001c0)=0x4, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0)={0x0, 0x7fffffff}, 0x8) r2 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) write$UHID_INPUT(r2, &(0x7f0000000600)={0x8, "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", 0x1000}, 0x1006) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000005c0)='cpuset.mems\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000040)='\'', 0xffffffffffffffad}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x100000000}) sendfile(r0, r0, &(0x7f0000000000)=0x39044, 0x2000005) 04:04:36 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0xf}, 0x0) [ 241.821212] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 241.837659] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xf2ffffff00000000, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xffffffeb, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000080)=""/79) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 04:04:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x700000000000000, @loopback}, 0x1c) 04:04:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf401000000000000, @loopback}, 0x1c) 04:04:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0xc0}, 0x0) [ 242.040615] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:37 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xe9ffffff, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:37 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x1f3ffffff}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:37 executing program 1: getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="624930b56d9f3acccfc54cf39857914fa1d339a019bd19c3ac92b00d5848fa2707b303b1886603c139d0109efd9a827c437804e0daa5026a0859eb26f0e9bed875cda341af0abdb22e007d15c93baf4d8ad09d39534ed47a1f7433c89165afc9c083e51616481aa07a276f0c9f6abdd87c3af9e2ad2b4bbc5c41a7a1c49a9fea9ef52e2da1c96d11ed7b81be819cc98f38d88dd0c8dc5aac29dcee8177b2b34d93"], 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x252, 0x82) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000340)={0x6, 0x43d, 0x1, 0x1, 0x800}) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f00000001c0)=0x4, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0)={0x0, 0x7fffffff}, 0x8) r2 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) write$UHID_INPUT(r2, &(0x7f0000000600)={0x8, "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", 0x1000}, 0x1006) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000005c0)='cpuset.mems\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000040)='\'', 0xffffffffffffffad}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x100000000}) sendfile(r0, r0, &(0x7f0000000000)=0x39044, 0x2000005) 04:04:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa9f70200, @loopback}, 0x1c) 04:04:37 executing program 3: getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="624930b56d9f3acccfc54cf39857914fa1d339a019bd19c3ac92b00d5848fa2707b303b1886603c139d0109efd9a827c437804e0daa5026a0859eb26f0e9bed875cda341af0abdb22e007d15c93baf4d8ad09d39534ed47a1f7433c89165afc9c083e51616481aa07a276f0c9f6abdd87c3af9e2ad2b4bbc5c41a7a1c49a9fea9ef52e2da1c96d11ed7b81be819cc98f38d88dd0c8dc5aac29dcee8177b2b34d93"], 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x252, 0x82) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000340)={0x6, 0x43d, 0x1, 0x1, 0x800}) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f00000001c0)=0x4, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0)={0x0, 0x7fffffff}, 0x8) r2 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) write$UHID_INPUT(r2, &(0x7f0000000600)={0x8, "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", 0x1000}, 0x1006) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000005c0)='cpuset.mems\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000040)='\'', 0xffffffffffffffad}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x100000000}) sendfile(r0, r0, &(0x7f0000000000)=0x39044, 0x2000005) 04:04:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xf3ffffff00000000, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 242.136640] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x20000}, 0x0) 04:04:37 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xffffffe9, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfc00000000000000, @loopback}, 0x1c) [ 242.319301] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xffffff9e}, 0x0) 04:04:37 executing program 3: getpgid(0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="624930b56d9f3acccfc54cf39857914fa1d339a019bd19c3ac92b00d5848fa2707b303b1886603c139d0109efd9a827c437804e0daa5026a0859eb26f0e9bed875cda341af0abdb22e007d15c93baf4d8ad09d39534ed47a1f7433c89165afc9c083e51616481aa07a276f0c9f6abdd87c3af9e2ad2b4bbc5c41a7a1c49a9fea9ef52e2da1c96d11ed7b81be819cc98f38d88dd0c8dc5aac29dcee8177b2b34d93"], 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x252, 0x82) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000340)={0x6, 0x43d, 0x1, 0x1, 0x800}) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f00000001c0)=0x4, 0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0)={0x0, 0x7fffffff}, 0x8) r2 = memfd_create(&(0x7f0000000140)="6367726f7570320075b536e08f97e10c4289e296462f3c8fc6a418228027bf4d75931e238b41cf55afcf7dd2284567ed5a738f3382aae6349e10336adf686499eb1d9379eb28", 0x1) write$UHID_INPUT(r2, &(0x7f0000000600)={0x8, "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", 0x1000}, 0x1006) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000005c0)='cpuset.mems\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000280)=[{&(0x7f0000000040)='\'', 0xffffffffffffffad}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)={0x100000000}) sendfile(r0, r0, &(0x7f0000000000)=0x39044, 0x2000005) 04:04:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xe9ffffff00000000, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:37 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xffffffeb, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x700, @loopback}, 0x1c) [ 242.419207] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:37 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x1e9ffffff}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:37 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) sendmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in, 0x10, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000600), 0x0, &(0x7f0000002040)}}], 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$lock(r0, 0x0, &(0x7f0000000100)={0x1, 0x3, 0x200, 0x0, r1}) r2 = accept4(r0, &(0x7f0000000140)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000200)={0x0, 0x3}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000280)={0x5, 0x4, 0x7fffffff, 0x7, r3}, 0x10) 04:04:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5455010000000000, @loopback}, 0x1c) 04:04:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xebffffff00000000, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:37 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x9effffff00000000}, 0x0) 04:04:37 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x1ebffffff}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 242.604810] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:37 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$setownex(r0, 0xf, &(0x7f0000000340)) syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x6, 0x1) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000007c0)=ANY=[]) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x4, 0x2ffffffff}, 0xffffff64) r2 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x200, 0x120) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000003c0)={0x80}, 0x14) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x6, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8000, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000400), 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 04:04:37 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000ff0f, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000000000000000000002000000000000000500000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000008000000000000000000000000000000002000000000000000100000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000700000000000000030000000000000006000000000000000000000000220000000000000000000000000000000000000000000000000000050000000000000007000000000000000f13000000000000000000000000000000ee0000000000000a0500000000000000000000000000005b000000000000000500000000000000020000000000000000000000000000000000000000000000800a0000000000000000000000000000"]) [ 242.739315] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x600, @loopback}, 0x1c) 04:04:37 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xf3ffffff00000000, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xf0ffffff00000000}, 0x0) [ 242.811327] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 242.873353] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:37 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0xfff) r1 = syz_open_procfs(0x0, &(0x7f0000d09fe9)='smaps\x00') getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x1, 0x2, [0xfffffffffffffff9, 0x7]}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x401}, &(0x7f0000000180)=0x8) mmap(&(0x7f000094a000/0x4000)=nil, 0x4000, 0x0, 0x4d031, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f00000000c0)=""/8, 0xfffffdfc, 0x100003) 04:04:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x49000000, @loopback}, 0x1c) 04:04:38 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xf3ffffff, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 242.943307] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:04:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xfffff000}, 0x0) 04:04:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getpid() r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001940)='/dev/full\x00', 0x20000, 0x0) ioctl$sock_bt(r1, 0x8907, &(0x7f0000001980)="ac7ad180cb0d61875ae4c0829f755ece25ed22e1a4b36a9756ebb264046206b4342cdf8a01e85775919df24a0148f33eebae9b41510343a0cb7a9346a69175321c4558b7931a4c2f7a966656aa82ec21b2ee1cd3d29ea4b26c9412496132a050eb43ede43692c7d75118fd5ca795818204e68ddb23eb38e171d35ff06bf61a3a56a1876fe9ac94bdc5dd88cf19ea0c0b75d6c44675071d3639cf5b9552a9cf6fb88c5dfe46438f0edef5805be7ac9e0a06dc74af7e2a30bd1de9e804eff9a1041d85f2") r2 = getpgid(0xffffffffffffffff) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='bridge0\x00') ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r2) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x40000, 0x4) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000b2a7"], &(0x7f0000000100)=0xe) [ 243.019242] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:38 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x1f2ffffff}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa, @loopback}, 0x1c) 04:04:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xf3ffffff, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:38 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0xebffffff, 0x0, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:38 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000180)={[], 0x0, 0x1, 0x80000000}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x204000, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000140)={0x20, 0x3ff, 0x1e5, 0x5, 0xd2f, 0x7f}) r2 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000200)=r2) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000040)=""/30) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000080)={0x7fff, 0xcc}) 04:04:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xffffff7f}, 0x0) 04:04:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x240, @loopback}, 0x1c) 04:04:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) read(r0, &(0x7f0000000040)=""/44, 0x2c) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x7e, 0x0, [0x206, 0x2]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0xffffffffffff0001, 0x4) [ 243.205519] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:38 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x1fffffff3}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xffffff8d, @loopback}, 0x1c) 04:04:38 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff3, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:38 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x11, &(0x7f0000000080), &(0x7f0000001ac0)=0x4) 04:04:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xf0ffff}, 0x0) [ 243.363575] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:38 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x1ffffffe9}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:38 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40800, 0x0) getsockopt$inet6_int(r0, 0x29, 0x5c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$inet(0x2, 0x3, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 04:04:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x500000000000000, @loopback}, 0x1c) [ 243.633000] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe00, @loopback}, 0x1c) 04:04:38 executing program 1: ioperm(0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000000)=0xc) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1, 0x40) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000080)=""/117) clone(0x80000, &(0x7f0000000000), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 04:04:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x1000000}, 0x0) 04:04:38 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xffffffe9, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xffffffe9, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:38 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffeb, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 243.750877] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 243.852177] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:38 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001700)='/dev/mixer\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000001740)={0x8000, 0x721, 0x2, 0x1, 0x3, 0x6}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001600)=[{&(0x7f0000001280)=""/21, 0x15}, {&(0x7f00000012c0)=""/72, 0x48}, {&(0x7f0000001340)=""/70, 0x46}, {&(0x7f00000013c0)=""/1, 0x1}, {&(0x7f0000001400)=""/228, 0xe4}, {&(0x7f0000001500)=""/213, 0xd5}], 0x6, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000080)={0x2800000000000000, 0x6000, 0x80, 0x8, 0x7}) syz_open_pts(r2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') io_setup(0x0, &(0x7f00000000c0)=0x0) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000140)) getsockopt(r3, 0x3, 0x8001, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) io_destroy(r4) getsockopt$inet6_dccp_int(r3, 0x21, 0x17, &(0x7f0000001200), &(0x7f0000001240)=0x4) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f00000017c0)=ANY=[@ANYBLOB="090000002f00000025090000000000007f0000000000000001fcffff000000000000000001000000000000000000000001000000000000000100000000000000ff0f000000000000feffffff00000000fbab0000000000000200000000000000070000000000000003000000000000007f00000000000000ff0100000000000002000000000000000800000000000000170d000000000000ce804c32145892f9"]) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000001640)={[0x2004, 0xd004, 0x4, 0x6000], 0x100, 0x60, 0x7}) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000011c0)) dup3(r0, r2, 0x0) 04:04:38 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffff2, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x55550000, @loopback}, 0x1c) 04:04:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xf0ffffff}, 0x0) 04:04:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc2ffffff00000000, @loopback}, 0x1c) 04:04:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xffffffeb, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 244.014074] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 244.050835] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xfffffff0}, 0x0) 04:04:39 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xf3ffffff00000000, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xf3ffffff00000000, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x7) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x1ff, 0x100000001, 0x80000000000, 0xfff}, {0x8, 0x80000001, 0x85c, 0x2}, {0x0, 0x2a1c, 0xa4ba}, {0x4, 0xc3da, 0xfffffffeffffffff, 0x715}, {0x3, 0x7, 0x9, 0x400}, {0x2000000000000, 0x9, 0x9, 0x20}, {0x3, 0x1ff, 0x5, 0x1d9}, {0x749, 0xb24a, 0x400, 0x80000001}]}, 0x8) 04:04:39 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xffffffeb, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x20000000, @loopback}, 0x1c) 04:04:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x14a10, @loopback}, 0x1c) 04:04:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xfffffffffffff000}, 0x0) 04:04:39 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001700)='/dev/mixer\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000001740)={0x8000, 0x721, 0x2, 0x1, 0x3, 0x6}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001600)=[{&(0x7f0000001280)=""/21, 0x15}, {&(0x7f00000012c0)=""/72, 0x48}, {&(0x7f0000001340)=""/70, 0x46}, {&(0x7f00000013c0)=""/1, 0x1}, {&(0x7f0000001400)=""/228, 0xe4}, {&(0x7f0000001500)=""/213, 0xd5}], 0x6, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000080)={0x2800000000000000, 0x6000, 0x80, 0x8, 0x7}) syz_open_pts(r2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') io_setup(0x0, &(0x7f00000000c0)=0x0) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000140)) getsockopt(r3, 0x3, 0x8001, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) io_destroy(r4) getsockopt$inet6_dccp_int(r3, 0x21, 0x17, &(0x7f0000001200), &(0x7f0000001240)=0x4) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f00000017c0)=ANY=[@ANYBLOB="090000002f00000025090000000000007f0000000000000001fcffff000000000000000001000000000000000000000001000000000000000100000000000000ff0f000000000000feffffff00000000fbab0000000000000200000000000000070000000000000003000000000000007f00000000000000ff0100000000000002000000000000000800000000000000170d000000000000ce804c32145892f9"]) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000001640)={[0x2004, 0xd004, 0x4, 0x6000], 0x100, 0x60, 0x7}) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000011c0)) dup3(r0, r2, 0x0) 04:04:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001700)='/dev/mixer\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000001740)={0x8000, 0x721, 0x2, 0x1, 0x3, 0x6}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001600)=[{&(0x7f0000001280)=""/21, 0x15}, {&(0x7f00000012c0)=""/72, 0x48}, {&(0x7f0000001340)=""/70, 0x46}, {&(0x7f00000013c0)=""/1, 0x1}, {&(0x7f0000001400)=""/228, 0xe4}, {&(0x7f0000001500)=""/213, 0xd5}], 0x6, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000080)={0x2800000000000000, 0x6000, 0x80, 0x8, 0x7}) syz_open_pts(r2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') io_setup(0x0, &(0x7f00000000c0)=0x0) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000140)) getsockopt(r3, 0x3, 0x8001, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) io_destroy(r4) getsockopt$inet6_dccp_int(r3, 0x21, 0x17, &(0x7f0000001200), &(0x7f0000001240)=0x4) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f00000017c0)=ANY=[@ANYBLOB="090000002f00000025090000000000007f0000000000000001fcffff000000000000000001000000000000000000000001000000000000000100000000000000ff0f000000000000feffffff00000000fbab0000000000000200000000000000070000000000000003000000000000007f00000000000000ff0100000000000002000000000000000800000000000000170d000000000000ce804c32145892f9"]) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000001640)={[0x2004, 0xd004, 0x4, 0x6000], 0x100, 0x60, 0x7}) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000011c0)) dup3(r0, r2, 0x0) 04:04:39 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xf2ffffff00000000, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 244.320620] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 244.340129] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:39 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xebffffff00000000, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff00000000000000, @loopback}, 0x1c) 04:04:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xf0ffffffffffff}, 0x0) 04:04:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x1000000, @loopback}, 0x1c) 04:04:39 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xf3ffffff00000000, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 244.537074] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 244.576196] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x100000000000000, @loopback}, 0x1c) 04:04:39 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001700)='/dev/mixer\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000001740)={0x8000, 0x721, 0x2, 0x1, 0x3, 0x6}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001600)=[{&(0x7f0000001280)=""/21, 0x15}, {&(0x7f00000012c0)=""/72, 0x48}, {&(0x7f0000001340)=""/70, 0x46}, {&(0x7f00000013c0)=""/1, 0x1}, {&(0x7f0000001400)=""/228, 0xe4}, {&(0x7f0000001500)=""/213, 0xd5}], 0x6, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000080)={0x2800000000000000, 0x6000, 0x80, 0x8, 0x7}) syz_open_pts(r2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') io_setup(0x0, &(0x7f00000000c0)=0x0) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000140)) getsockopt(r3, 0x3, 0x8001, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) io_destroy(r4) getsockopt$inet6_dccp_int(r3, 0x21, 0x17, &(0x7f0000001200), &(0x7f0000001240)=0x4) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f00000017c0)=ANY=[@ANYBLOB="090000002f00000025090000000000007f0000000000000001fcffff000000000000000001000000000000000000000001000000000000000100000000000000ff0f000000000000feffffff00000000fbab0000000000000200000000000000070000000000000003000000000000007f00000000000000ff0100000000000002000000000000000800000000000000170d000000000000ce804c32145892f9"]) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000001640)={[0x2004, 0xd004, 0x4, 0x6000], 0x100, 0x60, 0x7}) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000011c0)) dup3(r0, r2, 0x0) 04:04:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x100000000000000}, 0x0) 04:04:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:39 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2000, @loopback}, 0x1c) 04:04:39 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x57) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000040)) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24, 0xac, @remote, 0x8ad}, 0x1c) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x30c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xe6, "a5f98c1aa0bde856aeb9c048512e2ae3361b266f44ce5a7bbf87382c794b9213ca53401de6689fc17a4e9265ab8464e486ed518da6c03cc4addbf1e37e64ac226f77244168cdfec35114cc8c52141f2913fe924ad98852be73837973b3e6cb1b6f946ed497d3ad42b319ef81e5f911784a6e40c487fcb4d58a2e45ea72c76f939df09b9f497f7a41bd8454584a76baf1fb8ea24709a30e940fde1ae38c7c2e911cf8299417687cedc0f8838db9e18121586132615fdea536606e18dc0e584d30c433d4c4e20c6af263467ea85771f530685348d28b08bb451f45e7de9b3800d22cfe7a6be921"}, &(0x7f0000000240)=0xee) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x140000, 0x8004, 0x264b190, 0x7fffffff, r3}, 0xfffffffffffffc8e) getuid() setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)=ANY=[@ANYBLOB="010000000a00000000000000ff01000000000000000000000004000100000000000000000000000000001600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eaffffff0000004c804409511af148000000000000000000"], 0x90) [ 244.753810] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x9effffff}, 0x0) 04:04:39 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xe9ffffff00000000, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:39 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001700)='/dev/mixer\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000001740)={0x8000, 0x721, 0x2, 0x1, 0x3, 0x6}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001600)=[{&(0x7f0000001280)=""/21, 0x15}, {&(0x7f00000012c0)=""/72, 0x48}, {&(0x7f0000001340)=""/70, 0x46}, {&(0x7f00000013c0)=""/1, 0x1}, {&(0x7f0000001400)=""/228, 0xe4}, {&(0x7f0000001500)=""/213, 0xd5}], 0x6, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000080)={0x2800000000000000, 0x6000, 0x80, 0x8, 0x7}) syz_open_pts(r2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') io_setup(0x0, &(0x7f00000000c0)=0x0) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000140)) getsockopt(r3, 0x3, 0x8001, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) io_destroy(r4) getsockopt$inet6_dccp_int(r3, 0x21, 0x17, &(0x7f0000001200), &(0x7f0000001240)=0x4) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f00000017c0)=ANY=[@ANYBLOB="090000002f00000025090000000000007f0000000000000001fcffff000000000000000001000000000000000000000001000000000000000100000000000000ff0f000000000000feffffff00000000fbab0000000000000200000000000000070000000000000003000000000000007f00000000000000ff0100000000000002000000000000000800000000000000170d000000000000ce804c32145892f9"]) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000001640)={[0x2004, 0xd004, 0x4, 0x6000], 0x100, 0x60, 0x7}) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f00000011c0)) dup3(r0, r2, 0x0) [ 244.808382] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xfffffff2, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:39 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf5ffffff00000000, @loopback}, 0x1c) 04:04:39 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r2}}, 0xc) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x57) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000040)) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24, 0xac, @remote, 0x8ad}, 0x1c) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x30c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xe6, "a5f98c1aa0bde856aeb9c048512e2ae3361b266f44ce5a7bbf87382c794b9213ca53401de6689fc17a4e9265ab8464e486ed518da6c03cc4addbf1e37e64ac226f77244168cdfec35114cc8c52141f2913fe924ad98852be73837973b3e6cb1b6f946ed497d3ad42b319ef81e5f911784a6e40c487fcb4d58a2e45ea72c76f939df09b9f497f7a41bd8454584a76baf1fb8ea24709a30e940fde1ae38c7c2e911cf8299417687cedc0f8838db9e18121586132615fdea536606e18dc0e584d30c433d4c4e20c6af263467ea85771f530685348d28b08bb451f45e7de9b3800d22cfe7a6be921"}, &(0x7f0000000240)=0xee) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x140000, 0x8004, 0x264b190, 0x7fffffff, r3}, 0xfffffffffffffc8e) getuid() setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)=ANY=[@ANYBLOB="010000000a00000000000000ff01000000000000000000000004000100000000000000000000000000001600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eaffffff0000004c804409511af148000000000000000000"], 0x90) 04:04:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xe9ffffff00000000, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xf000}, 0x0) 04:04:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x9, @loopback}, 0x1c) [ 245.016510] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:40 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xebffffff00000000, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000300)={0xffff, 0x3, 0x0, 0x24a, "4f3bdd85ce460300d4d10000000004000000000000000400"}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) write$input_event(r1, &(0x7f0000000140)={{0x0, 0x2710}, 0x4, 0x762, 0x9}, 0x10) setsockopt$packet_int(r1, 0x107, 0x10, &(0x7f0000000500)=0x8, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000540)={0x8, 0x0, [{0x0, 0x4, 0x0, 0x0, @sint={0xc56, 0x3}}, {0x400, 0x1, 0x0, 0x0, @irqchip={0x2, 0x34e656a3}}, {0xf68, 0x3, 0x0, 0x0, @irqchip={0x0, 0xdb7a}}, {0x5, 0x4, 0x0, 0x0, @sint={0x7, 0xc2}}, {0x9, 0x7, 0x0, 0x0, @sint={0x6, 0x4}}, {0x100, 0x3, 0x0, 0x0, @sint={0x7ff, 0x9d}}, {0x79, 0x4, 0x0, 0x0, @irqchip={0x7f, 0x4}}, {0x1ff, 0x1, 0x0, 0x0, @sint={0x0, 0x80000001}}]}) bind$can_raw(r1, &(0x7f00000002c0)={0x1d, r2}, 0x10) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x3fff, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f00000004c0)=0x4, 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000800)={'syzkaller0\x00', &(0x7f0000000700)=@ethtool_rxnfc={0x31, 0x1f, 0x3, {0xf, @ether_spec={@dev={[], 0x1a}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0x3}, {"1723", @local, 0x8000, 0x7, [0x401, 0x3]}, @ether_spec={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @local, 0xc6}, {"ca84", @remote, 0x6, 0x5, [0x6, 0x8001]}, 0x8, 0x8}, 0x9, [0x4, 0x70, 0x81, 0x2, 0x4, 0x10001, 0x3607bc75, 0x5, 0x3]}}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x111, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f0000000340), 0x4, r5, 0x3c, 0x0, @in6={0xa, 0x4e20, 0x4, @ipv4, 0x800}}}, 0xa0) connect$l2tp(r3, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x1, 0x4, 0x0, 0x1, {0xa, 0x4e23, 0x5, @ipv4={[], [], @remote}, 0xff}}}, 0x32) 04:04:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xebffffff00000000, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:40 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 245.139364] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf5ffffff, @loopback}, 0x1c) 04:04:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf5ffffff00000000, @loopback}, 0x1c) 04:04:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xf0}, 0x0) 04:04:40 executing program 3: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/md0\x00', 0x2000002, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000000)) lookup_dcookie(0x0, &(0x7f00000000c0)=""/4096, 0x1000) r1 = syz_open_dev$dmmidi(&(0x7f0000001100)='/dev/dmmidi#\x00', 0x8, 0x2000) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)=0x8) 04:04:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xf2ffffff00000000, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2, @loopback}, 0x1c) [ 245.292890] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 245.356159] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa000000, @loopback}, 0x1c) 04:04:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x49, 0xffffffffffffffff, 0x2000000000047f]}) 04:04:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x2}, 0x0) 04:04:40 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xf3ffffff, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:40 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffe9, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 245.397769] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000430001037e65eb50fb24b700000000000800fe31051dfe7d8e7d10386e"], 0x1c}}, 0x0) 04:04:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0xffffff7f00000000}, 0x0) 04:04:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x49, @loopback}, 0x1c) [ 245.570912] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:40 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xebffffff, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x204400, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000001100)={0x0}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000001180)={0x0, 0x6, 0xc2f, 0x0, 0x8, 0x6, 0x2, 0x0, {0x0, @in={{0x2, 0x4e23, @local}}, 0xffffffffffff7fff, 0x800, 0x80000001, 0x80000000, 0x67}}, &(0x7f0000001240)=0xb0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001540)={0x0, 0xdd, "71a2484e70e8a59cb755def14e527bdf0d6f6cfcf5e7628a2443049d810a5ca95e9c1afa1be5a68dc6d903cf907619a34d1a625d41f48d67e916ecad1c5d74a99b20036e8eb3ed6e19f0ae130743a5dd43cbcd81176c8548344e4131ea6a9d609de395d14e60ecc96837a43295e40d8d14f9952b51f1f2085a5e8de0bcbc29e43f8035efb516d41e8ca2b855da1c2ede87b9c467d8b35b63b85717afc5f032abc25c5f5f819c0b20f9fad65ab73a5ee48a456739b771928d23244426d0b4c388510d49efcceccd6be5c7f38258ba1177bbd545d8a91883e914f9994590"}, &(0x7f0000001640)=0xe5) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000002840)={0x0, 0xfffffffffffffffe, 0xe, 0x321c}, &(0x7f0000002880)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000028c0)={0x0, 0x9}, &(0x7f0000002900)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000002c80)={0x0, 0x100000001}, &(0x7f0000002cc0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000002d00)={0x0, 0xe25f}, &(0x7f0000002d40)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000002e40)=[{&(0x7f00000000c0)=@in={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000240)="6802ce5ea87ed660da2350c1c1cd077bf3bf9b05fcda0d6dab49a3039620f3c743121c807941a100eb51b274b6223d74364d55c10e6ae3a4a354f0ec4c8ff659eabf70454792c724027addfbabf15832e243f4282844bff646ee2ebe7501c899ca386528d67d", 0x66}, {&(0x7f00000002c0)="5409c5a3f699f33534e857b4c967b4f0e3cd3c0e0f786f258ea7810af04df4b12445cf4014ea10d218654ae849348e808978346e5b17ad398016eb5d83a569e9f3e5b1960539a02ae8a4835e683ff82d900d749dc10d04f61c41df0be45c09e626d879882a5d106a1ddb50", 0x6b}, {&(0x7f0000000340)="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", 0xfd}, {&(0x7f0000000440)="689095f72caded6d864fa1875870cdbdb3e40f9f248aa4993d8daf696a2a3de01cd41cb64dc82fdf12168a6147e537c3d03ad0a9e41320f6a00402bb576b164245fe8b875e53de2408b37b6a6ca185606766291d982f434eae4269b1f5b9275ba61f3843c9d37db9d1198950c5a4480eb1a1665a5f76b5faa6fcbbdab6", 0x7d}], 0x4, 0x0, 0x0, 0x41}, {&(0x7f00000004c0)=@in={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000500)="2a340cc6f325b566b1f67b5caea073665fad23c376a49215340179fc34913a1fc98645b541327b27c3e302890ea7f3b2c161deb4132b3a7456559214ce21a6152501ece4d0bac1344a549191c23a1d4a2b8360a4065259c8f4d09cce7e2f9513e4688d83782398f7f7c987a3fadb12b85fd76e2f71313d4dd85f61b75a41967da3ca5c42ba3dfbed01579722b9eca25917f24265981758f9ffb1eac62f805587c08685be0f", 0xa5}, {&(0x7f00000005c0)="5e3419b3407306cb43a002c96761b658b1e204a4fb1efc3676fb9e4ee5b25fd7db0881181d9845bd808316e7bfa05cc07380f9595a1b1aa2c8d03aa54f9f1f1b83a76f303ca7df6044223b95ef9b435da370115e5356a91e5476898c18ea934e34c7f3fbd7386565a29a967491a44230fe4c6bf2a7e7023b786f2f09773df67223052beb8f94d17672a8fdd2409d7a99b526a2d6444f59ac6e05302ec769d38fbca084801a9415a45c4a8b1bee4974aaeaa82a0f726a229df060814ebb9417f03a4e29c21bec1d7fdbb798be6e4c2b3059bc0ca2e141ea8e09b46f474579f93b02e89243c4ee2a1f06a262989d26f3dc5e2761378e4bdbf0e1f9c5b1a690", 0xfe}, {&(0x7f00000006c0)="28ce3566e2f61a8e405dd8aa9e91639c2ef3a2dea7fb789b3bfce0902d699f7f3ea374d03e0f91afb3df8b3446125f4d45625823a07609127a34672587e42b005ab00ea8c3c4455783e5a4575c9c674ffb95bdfa92848c1724155c0b3ed3ae635444751419aac1bf6099751514773d71723c7a6f6644daebc60901c0922ad3867fac8ed5a39ca129961f8f684c4111742bf51eb43b55", 0x96}, {&(0x7f0000000780)="85234a642ca0132f945b235db1fbc5c43be998ebdf5ca1204b5c", 0x1a}, {&(0x7f00000007c0)="15a5e2bbce9056510e14feda5be02387be13de89fc9d8345c560", 0x1a}, {&(0x7f0000000800)="253cc726f7ad273d4862fd4d00a0c752f43dbf95b189359c506a92245a71b36d91577ba611e5943f44088f46", 0x2c}, {&(0x7f0000000840)="e72826b2b9f3f9c968251c655a6ab7f9ea698af96b04e4118c2e72a8ea5c23c12a5a94f77b46d8830d31fb136b10015ea6ec589d052c2a7fa60f527d3cceef840e4d4e9df97bdc8d1962296d76cdbd9f3d24000b9bd4d843", 0x58}, {&(0x7f00000008c0)="18096a6266f89bc6831449fe6d984fcfb826dec46cf42b5f4658e8703316e038baffe75bc8744f187af4559807ab015b6edcf1c161efea47077905e9f0bd3e6af9d1c4df076c5d941b9b265a5b1bb57d3cc0b939ff6ffdb7a0a5ba76b35a191a3bc576b1d572abd5e73f5786537a0a84556505e8f55145fd26c7d2ca6ec04f56f92ca7fa83bbd24b32502757bac92499e545353eeb7b397d78961404e40a35a3a28099598d2d00700d16d8953a2789f18ad0237e8fdc02d1d151c22c5d1c6758859db416fecfe924b7b4bb86", 0xcc}, {&(0x7f00000009c0)="9167", 0x2}], 0x9, &(0x7f0000000a80)=[@prinfo={0x14, 0x84, 0x5, {0x20, 0x3}}], 0x14, 0x4004080}, {&(0x7f0000000ac0)=@in={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000010c0)=[{&(0x7f0000000b00)="b516d9f4e3606c75b0d588c6b87dfb5cef1e1d5e5f3565f235717dcbf2d25b2af1b409f4ca95cab926f3f0f9e5348bcc98b70b2d0c746a02bb282780c5c5941746342e6d27c1947bd217f50e11be7c8fd60178a58cf045f71522c8ae3515c14f9e28207c6fbb582ad895b8dfe832d99298ccf70cadd352fb15bad32075197ab3b0db8a2812e41e1161afbeca2d65d18e57269713c9d7c4a9b59c756610e9e6758894f43c942ffe40510562acf2e3a9bd30", 0xb1}, {&(0x7f0000000bc0)="dfffabced99bf4c5ffaace708d3a6c79b62e4d4cccbc30ed3b1de25882e12132928eb65eb2f5d9803f3ba564f609e3797625fc0f607fdab2341840d9cae35868f970a1e6c2d6354be6bc606282788eb5223d682c015092f2aeaf94e3b541fc7e31db", 0x62}, {&(0x7f0000000c40)="1f2ea3ce522ede9960b659d61648c9c05e5d39568f57214504154dd8cb1f2429c1346ccc7307172f9e37a8b96ad4f9cd0807e853a726d41812531423b27b751032744ef4832873e8e906a3bf18e2b1f05093eafa0cc8022dcbba008f1917353f6d73d703512eb7ea00715c39ec380d1aaae485ede901aed3799b0ca3fe772b5e1267fab669cc88", 0x87}, {&(0x7f0000000d00)="80188786fe10df3eaf9e8d33a57ae2b73a689c6199294b9966ac617d61701f6a7669a9d2dcb64b749312a72019c4093603eb41eb6204358c2343846846a138be87ca1683d78bdd2585bf48408e929e909e04663549702e5f88d6957b58b1251fff2244e333ee1a7dd6da1a551b6002e21bd11ce323ad7642dae6cc1a38a11eb3d8bf8c5a34adddd9e15a00ebb987643714cc58a5006d807519e42b5920bf07506b6ef627bda33cc95c91f48f85", 0xad}, {&(0x7f0000000dc0)="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", 0xfc}, {&(0x7f0000000ec0)="f98aeaa9d46866c8a46613ffa777b1efe7a17429ae0a701d317f1f4adb7fb33b2989c7caa65fe4139b081963d64f438b9a838732de3a4be80ea6026018a00d0e2428426c588e147ed8a323d22cd7d800b557bb2b72e75e3f2eaa18bf26b22c86c7a71a2ed27cf640d03e1c7f1fe0313c11321e4e6e10a0c567939cdf5a8415c6763285817074fc425c5fc7fb3370b9019a3b7415705aaf64c0", 0x99}, {&(0x7f0000000f80)="e61b5134cb0d0d13c7b48d8b802f937d91f24bd93aa2c4b0a86ba5dbf13bdae430502eccd30c2c418fc1f5d924b0e0182bc668e4f87f6be5bf7333def9d9755bc819bcf4882ec2f1289080ea4f66fb9d76f730678b354faacaeb8e29a6eeb8e592fba229ce2fae1d7280c48defd07056d7e44871f5bf19890dedb79b55e3213cee19fd9312f2c9bd4645922d1d9473590617f6b8545a", 0x96}, {&(0x7f0000001040)="8656019392f175e97364c109cbf0d298548a843bb86983bfe68b71c0cc157494b1627f4cb8bba1ffb5c7bc5cf7fd4f51a45d27eddc0ee693e9c2cef8000d95d04737d98fde2b90461994cce1540ce93a42518d5ee8698e55ad95486339f394b249", 0x61}], 0x8, &(0x7f0000001280)=[@authinfo={0x10, 0x84, 0x6, {0x5}}, @sndinfo={0x1c, 0x84, 0x2, {0x100, 0x20d, 0x80, 0x9, r1}}, @prinfo={0x14, 0x84, 0x5, {0x0, 0xc}}, @dstaddrv6={0x1c, 0x84, 0x8, @dev={0xfe, 0x80, [], 0xb}}, @dstaddrv6={0x1c, 0x84, 0x8, @mcast2}, @sndinfo={0x1c, 0x84, 0x2, {0x2, 0x8005, 0x40000000000, 0xfffffffffffff800, r2}}, @prinfo={0x14, 0x84, 0x5, {0x10, 0x510}}, @authinfo={0x10, 0x84, 0x6, {0x15d}}], 0xb8, 0x80}, {&(0x7f0000001340)=@in={0x2, 0x4e24}, 0x10, &(0x7f0000001500)=[{&(0x7f00000013c0)="ac43987178ffafcd451e5b2e306f69760a2289d45f76a61ced2be744f31c68d7587cd8941b187c9c756d8e6bef6d4da256876136000ad78b49fb815595ec02a41daaca404966d9fdf5e9fd8d57d4551954c771ac568d5937c01dd643e0dcbaccf78554709ce1ba074484b2960f95e092d9ed65220f7d1170", 0x78}, {&(0x7f0000001440)="2a3fd043a77010b35a6f4d12ade52f9ae74221bf142f03039514b0880dc6657fffe28f29cb5ee3a2426c6d9e6f83bd25a0c0b1cb0f8527d9ca17e695a68b9fdab5b97b9baa3d6427de49d5561fed2a1f137862ac95bd6750e3f156a9d2b9df2999353edf518f8d299822259efb01", 0x6e}, {&(0x7f00000014c0)="dd", 0x1}], 0x3, &(0x7f0000001680)=[@prinfo={0x14, 0x84, 0x5, {0x30, 0x4}}, @sndrcv={0x2c, 0x84, 0x1, {0x66d, 0xfffffffffffffffa, 0x8, 0x6, 0x40, 0x0, 0x1000, 0x2, r3}}], 0x40, 0x11}, {&(0x7f00000016c0)=@in={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002800)=[{&(0x7f0000001700)="99c6e18acd25a7864e547a83a179d55c495a6b42bfb25834268c5fa2a2c91cc6f92f99eca73b9680aec203dd48c4db524ae9c8c66c195e012cd21462d23e2938d555a2358b731b9474d2e435320000e08fad70a436bcb89aaa5414fe30a139c64c0117f8988aa72f8ae4867f1a0375904834cb2d0382224310912fd096c6d76d417d48aed6", 0x85}, {&(0x7f00000017c0)="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", 0x1000}, {&(0x7f00000027c0)="41779e081081e47afed39e2c4946b4", 0xf}], 0x3, &(0x7f0000002940)=[@sndinfo={0x1c, 0x84, 0x2, {0x3, 0x5437ff9ad25bfaea, 0x6, 0x1, r4}}, @authinfo={0x10, 0x84, 0x6, {0x7}}, @authinfo={0x10, 0x84, 0x6, {0x8001}}, @init={0x14, 0x84, 0x0, {0x4, 0x8000, 0x1, 0x100000001}}, @sndinfo={0x1c, 0x84, 0x2, {0x7, 0x820f, 0xe8, 0x9, r5}}, @dstaddrv4={0x10}, @authinfo={0x10, 0x84, 0x6, {0x7}}], 0x8c, 0x20000041}, {&(0x7f0000002a00)=@in={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000002c40)=[{&(0x7f0000002a40)="01e33f3ecc2d061f53378bc2ac1f4bcdb9791dcdb3459b380669cd8eecc73de075786ca0b75e16f9ec16c0e38ca74a108a610ed038341b9e1d4862e903433ce95f0cdea04f51fc2110a97a985903dd2e4abbebadee75ee35c9429e2917768c966692ae1169b3a6a7d02a54558cdcb502444e5581cba966c39454157833d0d8f3ef33810d50a9a598428adcd4b6f9363354b4f2152a908152db72cdfe06a7db4e0a3aa2d6c02b467b577a78", 0xab}, {&(0x7f0000002b00)="bf30b8e3190e200e8dee8b31bad303904a61d7e1c356639a3c560665409c262ddf355bd566d24d779ec20741ac72e33e8ab7d75b1c14ab977afc8a108c43ff6c8105e8e21a796a303dc4898a5f166063aadfa0e2760ac256c04dc285", 0x5c}, {&(0x7f0000002b80)="bfb1cc77068a68941f700c05051843144da0a0efa30aeb20c3c2a57fb66bc60c7fb6ab572aff42efb189e19b856f5f3e9ea779af96155a16ca6b531f109e7f65a442da01084535f23be533a48a55c2e56f85e3dc952c66c20d737e6410e5eb56ecd25985f317eed79a8b643ababc731f3e94d94aae2ed1a4eee2a821bd9f2937e3ccc1d0dd5493511fb252431943e984db2c00cb1df0ba12a830d73e55", 0x9d}], 0x3, &(0x7f0000002d80)=[@init={0x14, 0x84, 0x0, {0x7, 0x3f, 0x3, 0x6}}, @sndrcv={0x2c, 0x84, 0x1, {0x3, 0xea, 0x8004, 0x1, 0x2, 0x0, 0x27, 0x10000, r6}}, @init={0x14, 0x84, 0x0, {0x80, 0xc5b, 0x7c8a138e, 0x9}}, @dstaddrv4={0x10, 0x84, 0x7, @multicast2}, @dstaddrv4={0x10, 0x84, 0x7, @multicast1}, @sndinfo={0x1c, 0x84, 0x2, {0xffff, 0xa5622887be1e07e0, 0xfffffffffffffffa, 0x7f, r7}}], 0x90, 0x890}], 0x6, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r9 = syz_open_procfs(r8, &(0x7f0000000140)='net/ipv6_route\x00') preadv(r9, &(0x7f0000000480), 0x2000000000000204, 0x0) 04:04:40 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0xbf, 0x10000) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000002c0)) write$P9_RMKNOD(r0, &(0x7f0000000300)={0x14, 0x13, 0x2, {0x0, 0x4, 0x8}}, 0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', r1}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000580)='/dev/rfkill\x00', 0x44000, 0x0) 04:04:40 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xe9ffffff00000000, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2000, @loopback}, 0x1c) 04:04:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xf3ffffff, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x2000000000000}, 0x0) [ 245.787356] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 245.807736] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:40 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000), 0x0}, 0x20) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x8, 0x84000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000b4e000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}}) close(0xffffffffffffffff) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 04:04:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x568, 0x6, [0x1, 0xa86bf78, 0x4, 0x1, 0x1, 0xfffffffffffffffd]}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000280)={0x0, 0xfc23, 0x2, [0x0, 0xed]}, &(0x7f00000002c0)=0xc) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x100}, 0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x7c, &(0x7f0000000300)=@assoc_value={r1}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x4, 0x3, 0x4, 0x5, 0x8, 0x6, 0x0, {0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x0, 0x8, 0x0, 0x4, 0xffffffff}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000180)=0x12) 04:04:40 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff00000000, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x200000000000000}, 0x0) 04:04:41 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xfffffff3, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0xe9ffffff, 0x0, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x8, @loopback}, 0x1c) 04:04:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe, @loopback}, 0x1c) 04:04:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000200)=@alg, &(0x7f0000000280)=0xd4a28e7b, 0x88000000000000) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[@ANYRES64=0x0], 0x8) shutdown(r2, 0x1) sendmsg$key(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000900)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x1) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 04:04:41 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) memfd_create(&(0x7f00000000c0)="e500", 0x2) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x5c, 0x22, 0x1, 0x0, 0x4, {0x4}, [@generic="3f0602123b2709aa2fe93334a171ae7353c2be81dedf0a2e16d9dc68001d1e0c0898551171d4873f874f0c5c1bf485787d564aaadbf31ca94a33c61ff02359e7fc35d2e5887f"]}, 0xfffffffffffffff8}, 0x1, 0x0, 0x0, 0x4}, 0x0) 04:04:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xf3ffffff, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) [ 246.074177] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 246.096865] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:41 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xfffffff2, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x2000000}, 0x0) 04:04:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe9, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xb, @loopback}, 0x1c) 04:04:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xffffff8d, @loopback}, 0x1c) 04:04:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xffffff9e}, 0x0) [ 246.293434] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002540)={'team0\x00'}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f000000bff7)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r3, 0x80000080304d65, &(0x7f0000001000)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setrlimit(0x11, &(0x7f00000000c0)={0x40000004, 0x1}) 04:04:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffeb, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 246.375284] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2000000, @loopback}, 0x1c) 04:04:41 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xffffffff00000000, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0xe9ffffff, 0x9b4, 0x7fffffff}], "", [[]]}, 0x178) 04:04:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xfffffff0}, 0x0) 04:04:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf5ffffff, @loopback}, 0x1c) [ 246.555415] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe9ffffff00000000, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x40000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x3f}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000000c0)={r1, 0x2b, "f182436ef138b1930ed278eee830f79f7e14d203ea22517cf7b5dbc8e8e7b7341ca9317c5b8b626a499699"}, &(0x7f0000000100)=0x33) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000040)) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000200), &(0x7f0000000240)='`', 0x1, 0xfffffffffffffffd) 04:04:41 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x1, 0x0) write$P9_RLOCK(r0, &(0x7f00000002c0)={0x8, 0x35, 0x2, 0x3}, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001840)='/dev/snapshot\x00', 0x201, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x80000, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r5, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x0, r4, &(0x7f00000000c0), 0x0, 0x9, 0x0, 0x0, r3}]) fchdir(r3) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) close(r1) [ 246.608993] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xfffff000}, 0x0) 04:04:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xebffffff00000000]]}, 0x178) [ 246.711978] encrypted_key: insufficient parameters specified 04:04:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe9ffffff, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x15554, @loopback}, 0x1c) 04:04:41 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xf2ffffff, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 246.757599] encrypted_key: insufficient parameters specified 04:04:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x51000000, @loopback}, 0x1c) 04:04:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xffffff7f}, 0x0) 04:04:41 executing program 1: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) socket(0x11, 0xf, 0x20) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@fragment, 0x8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e23, 0x100, @mcast1, 0x1ff}, {0xa, 0x4e21, 0x7d9, @ipv4={[], [], @local}, 0x68}, 0x80000000, [0x0, 0x7, 0x62, 0x100000000, 0x80000000, 0x1, 0x6, 0x571d]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000000)=0x3, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00007a8fff), 0x3a7, 0x20000000, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 04:04:41 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xe9ffffff00000000]]}, 0x178) 04:04:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 246.937227] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x1000000}, 0x0) [ 246.983172] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:42 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0xe9ffffff, 0x0, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:42 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xe9ffffff]]}, 0x178) 04:04:42 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x7) ioctl$TUNATTACHFILTER(r0, 0x400854d5, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2, 0x400, 0xfffffffffffffff9, 0x2}, {0xf233, 0x57a, 0x9, 0x1}, {0xff, 0x5, 0x5, 0xfffffffffffffffa}, {0x100000001, 0x100, 0x7fff, 0x8}]}) ioctl$TUNATTACHFILTER(r0, 0x400854d5, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x9, 0x10000, 0x4, 0x1e}, {0x0, 0x0, 0x7fff, 0xdf1}, {0xfffffffffffffff8, 0x2, 0x80000001, 0x80000000}, {0x5, 0xd12, 0xe28}, {0xfffffffffffffffb, 0x8, 0xffffffffffffffff, 0x7ff}, {0x65d, 0x1, 0x7ff, 0x80000001}, {0x2, 0x9, 0x2d, 0x101}, {0x2, 0x5a, 0x631, 0xffffffffffff7fff}]}) 04:04:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xf0}, 0x0) 04:04:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x8030100000000000, @loopback}, 0x1c) 04:04:42 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(r0, &(0x7f00000000c0)=[{{r1, r2/1000+10000}, 0x17, 0x0, 0x5}, {{r3, r4/1000+10000}, 0x0, 0x5, 0x100000000000000}, {{0x77359400}, 0x2, 0x5, 0x80}, {{0x77359400}, 0x1f, 0x0, 0x5}], 0x40) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00001fefe4)={0xa, 0x4f22}, 0x1c) listen(r5, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000100)=0x401, 0x4) r6 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$inet6_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f00000001c0), 0x4) writev(r6, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 04:04:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x9000000, @loopback}, 0x1c) 04:04:42 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x25, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040)="752ea464c43866902619a6f8afa61c947e1e1cf4b0eb5be9bb30307686b46b67e8a6e6ffbd95c40694320dc2694299", 0x2f, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000180)={@local, @rand_addr}, &(0x7f00000001c0)=0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x8) getpeername$netlink(r1, &(0x7f00000000c0), &(0x7f0000000140)=0xc) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24}, 0x1c) r2 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x1ff, 0x4000) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000480)='yeah\x00', 0x6bffe28037bb628) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast1}, 0x1b) tkill(r0, 0x1000000000016) 04:04:42 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xebffffff]]}, 0x178) 04:04:42 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xe9ffffff, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x100000000000000}, 0x0) 04:04:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff3, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 247.286492] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 247.305443] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000340)="030002", 0x3, 0x800000000008000, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) r1 = accept4(r0, &(0x7f0000000040)=@un=@abs, &(0x7f0000000140)=0x80, 0x80000) r2 = getpgid(0xffffffffffffffff) r3 = geteuid() r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x1, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r4, 0x2288, &(0x7f0000000580)) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r5, 0x5385, &(0x7f0000000740)={0xdc, ""/220}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = fcntl$getown(r0, 0x9) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) r9 = getgid() sendmsg$unix(r1, &(0x7f0000000540)={&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000200)="a3b0113cea37edaaa46d32f6f40554e7dc06b69f8ade5611b148216f1d9e12db15beb4d800df841d8938a8debbf47f12b036f1729ed56070a8dd3d27296dfad606b419b73273508a8169c3d42fbcdfcd125b6bac172f32dbfac94b9b3ed7ad6847aff1705fd7f18771b6677b5c16beda3e6bae3d317a91ab8797c0f340955107880f2c4bceaf0b21e7bb77c1a8caa4f2dee8f8b28de2179e8bdcce089a41860406117ef190bdc2193775593f3215", 0xae}], 0x1, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="10000000010000000100316cc44ac5b0a42054238aee00003f42d03c625867e144ae967d18be6545f7934bd1d9c16c3c4e2ed4deb0b05a1f31d79d20022e3f9243121f2634b1acdd21cc474705919e40011dcbe41b10c44388308dbf07cce4e4ee1e51c688d79e7718d7e5ffe3c9c87672ef90993a62644379c44d8e2dab1356f5ba44ebdb56652451830800d909afc940fcb18ab5775e16f42868b1cb8693c02b3f5b1049e064ed0bcfb700d73dbf9d2122239393c1da6372e763f41927d1a342967aaf681292350e32fefc6bd0c1160553176ee6e35b93f83385478f", @ANYRES32=r0, @ANYBLOB="180000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="140000000100000001000000", @ANYRES32=r0, @ANYRES32=r0], 0x54, 0x24000001}, 0x4040001) sendto$inet(r0, &(0x7f0000000000)="0900d1538e045a8700800020000011000055a6c9c2d25fe1f7", 0x281, 0xfffffffffffffffc, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0xa) 04:04:42 executing program 1: ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000040)=ANY=[@ANYBLOB="2f5a000028000000090000008409e1f82556080000000400000005"]) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000001240)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/157, 0x9d}], 0x2, &(0x7f0000001200)=""/13, 0xd, 0xb2}, 0x2000) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000001280)={'filter\x00', 0x30, "560e8c3e95e5150a510dbe02d04e98411ca9c1b1676e0728e00b6425a8d116d8e32c978b14d52ed1f5f999f8c2953781"}, &(0x7f0000001300)=0x54) r1 = syz_open_procfs(0x0, &(0x7f0000001480)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75c01f0200f58d26d7a071fb35331ce39c5aeeff5083cf07dd46455c914d4aff1e7cf7ed57c0c2056f5ca933f03cbf82bd13534737339245d31b0041be6281d7e1b4b7099114c571872298dd7f2120e2b6fa2a2e2a2c9c6e0034750b7961fa2c1584c0b5a500ae0ac39bc76a78d9158266759f766a3e8c84c09cf35a214a200421dcbc4cb6ee55476d8ead8882947ffa1fb4c050727beb12c57e06ff59") ioctl$SG_GET_NUM_WAITING(r1, 0xc0c0583b, &(0x7f0000000000)) 04:04:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x2000000000000}, 0x0) 04:04:42 executing program 1: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) socket(0x8, 0x80006, 0x2) read(r2, &(0x7f0000481000)=""/128, 0x80) 04:04:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xb000000, @loopback}, 0x1c) 04:04:42 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xf3ffffff]]}, 0x178) 04:04:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa000000, @loopback}, 0x1c) 04:04:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff2, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:42 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000003c0)=0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000200)=0xe8) sendmsg$can_raw(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x1d, r4}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)=@canfd={{0x0, 0x0, 0x3, 0x3da8}, 0x4, 0x1, 0x0, 0x0, "7236776b26842b7bd0270c09b1acbb41938293ef5cab5acec93168166c73f3259febe4c587f4d4b2693994e84e9d0723a64b9943f71cb1f9e6aa500cca48f6e1"}, 0x48}}, 0x800) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local, 'ip6_vti0\x00'}}, 0x1e) dup2(r0, r1) 04:04:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 04:04:42 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) [ 247.646326] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 247.658151] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:42 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xebffffff, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf3ffffff00000000, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:42 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0xfffffffffffffffc, @remote}, @icmp=@source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @multicast1}}}}}}, 0x0) 04:04:42 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xfffffff3]]}, 0x178) 04:04:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xf0ffffff}, 0x0) 04:04:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xaaaa0000, @loopback}, 0x1c) 04:04:42 executing program 3: r0 = socket(0x10, 0x80003, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f0000002840)=@bridge_delneigh={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x2}}, 0x1c}}, 0x0) 04:04:42 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x858, 0x2, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000), &(0x7f0000000080)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000fb9000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000100)="051db566b9030100c00f32ba6100b8cec8ef66b9360a00000f320f201c66660f3a1461813f0f01c86766c7442400040000006766c7442402280000006766c744240600000000670f011424ba4100ec0f08", 0x51}], 0x0, 0x0, &(0x7f0000000100), 0x1000000000000182) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x1}) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x0, 0x3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) keyctl$describe(0x6, 0x0, &(0x7f00000003c0)=""/117, 0x75) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:04:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x69dfbfab, @loopback}, 0x1c) 04:04:42 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xfffffff3, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xffffffe9]]}, 0x178) 04:04:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xf0ffff}, 0x0) 04:04:43 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000000)=""/43, 0x2b}], 0x1) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) 04:04:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff00000000, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 247.941954] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 247.966671] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:43 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xffffffe9, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x1000000, @loopback}, 0x1c) 04:04:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x7000000, @loopback}, 0x1c) 04:04:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff00000000, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xffffffeb]]}, 0x178) 04:04:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x9effffff}, 0x0) 04:04:43 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file1\x00', &(0x7f0000000500)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x856, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000810}, 0xc) symlink(&(0x7f0000000040)='.\x00', &(0x7f0000000140)='./file0/file0\x00') umount2(&(0x7f0000000000)='./file0/file0/file0\x00', 0x0) [ 248.229238] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) [ 248.271219] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf401, @loopback}, 0x1c) 04:04:43 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xffffffeb, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xf3ffffff00000000]]}, 0x178) 04:04:43 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d0252926285717070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) [ 248.412347] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf3ffffff, 0x0, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000240)="66b847000f00d8660f3a2183669300003736660f38805c6fb4b9800000c00f3235000400000f3066ba4300b800000000ef66660f38829e87d6b6ea0f01dfd9e1dbecc3", 0x43}], 0x1, 0xfffffffffffffffe, &(0x7f0000000600), 0x100000000000020f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:04:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x20000}, 0x0) 04:04:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x400000000000000, @loopback}, 0x1c) 04:04:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xf2ffffff]]}, 0x178) 04:04:43 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x800000000003, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f000088c000)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x800, 0x2, 0x0, 0x0, 0x0, 0x100}, 0x20) 04:04:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x218, @loopback}, 0x1c) 04:04:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe9, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:43 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xfffffff2, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xfffffff2]]}, 0x178) 04:04:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x2000000}, 0x0) [ 248.743301] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 248.761391] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:43 executing program 1: 04:04:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9ffffff00000000, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc2ffffff00000000, @loopback}, 0x1c) 04:04:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xaaaa000000000000, @loopback}, 0x1c) 04:04:44 executing program 1: 04:04:44 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xf3ffffff00000000, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:44 executing program 3: 04:04:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 04:04:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xf2ffffff00000000]]}, 0x178) [ 249.014406] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 249.019878] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff00000000, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:44 executing program 1: 04:04:44 executing program 3: 04:04:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0xffffffff00000000]]}, 0x178) 04:04:44 executing program 1: 04:04:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc4ffffff00000000, @loopback}, 0x1c) 04:04:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x2}, 0x0) 04:04:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf84b0100, @loopback}, 0x1c) 04:04:44 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xffffffff00000000, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:44 executing program 3: 04:04:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff00000000, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:44 executing program 1: [ 249.328481] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 249.341087] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x200000000000000}, 0x0) 04:04:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x1}, 0x1c) 04:04:44 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000014c0)={@ipv4={[], [], @multicast1}}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x402802, 0x0) 04:04:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xfffffff2]]}, 0x178) 04:04:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xffffffff00000000, @loopback}, 0x1c) 04:04:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfc000000, @loopback}, 0x1c) 04:04:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 04:04:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:44 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xf3ffffff, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:44 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl(r0, 0xc0184908, &(0x7f0000001000)) 04:04:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xfffffff3]]}, 0x178) 04:04:44 executing program 1: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x80) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000280), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x80003}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) close(r1) close(r2) [ 249.630157] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 249.649110] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 04:04:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff3, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x18020000, @loopback}, 0x1c) 04:04:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc48}], 0x1, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000140)) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) 04:04:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xffffffe9]]}, 0x178) 04:04:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc0fe, @loopback}, 0x1c) 04:04:44 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xe9ffffff00000000, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0xf000}, 0x0) 04:04:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x7, @loopback}, 0x1c) [ 249.994556] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 250.017463] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:45 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xffffffff00000000]]}, 0x178) 04:04:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffeb, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:45 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xebffffff00000000, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfec00000, @loopback}, 0x1c) 04:04:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 250.187159] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:45 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xf3ffffff]]}, 0x178) [ 250.265749] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc07}], 0x1, 0x61010000) 04:04:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff2, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe243970b00000000, @loopback}, 0x1c) 04:04:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 250.639129] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:45 executing program 3: ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/125) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 04:04:45 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xe9ffffff]]}, 0x178) 04:04:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa00, @loopback}, 0x1c) 04:04:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3ffffff00000000, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:45 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xf2ffffff00000000, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) 04:04:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5100000000000000, @loopback}, 0x1c) 04:04:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 250.900609] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 250.911676] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xebffffff]]}, 0x178) 04:04:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x103080, @loopback}, 0x1c) 04:04:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf84b010000000000, @loopback}, 0x1c) [ 251.132745] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 251.153057] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc07}], 0x1, 0x61010000) 04:04:46 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0xf2ffffff, 0x2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xffffffeb]]}, 0x178) 04:04:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 04:04:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3ffffff, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xffffffc4, @loopback}, 0x1c) 04:04:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfec00000, @loopback}, 0x1c) 04:04:46 executing program 3: ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000000c0)=""/125) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 04:04:46 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0xfffffff3, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 251.507142] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 251.533142] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x2000000000000}, 0x0) 04:04:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfc00, @loopback}, 0x1c) 04:04:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xf2ffffff]]}, 0x178) 04:04:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xaaaa, @loopback}, 0x1c) 04:04:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9ffffff, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 251.708236] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:46 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0xffffffe9, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 251.805370] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xe9ffffff00000000]]}, 0x178) 04:04:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x103080, @loopback}, 0x1c) 04:04:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 04:04:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) 04:04:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x7fffffff}], "13"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc07}], 0x1, 0x61010000) 04:04:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf4010000, @loopback}, 0x1c) 04:04:47 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0xffffffeb, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) [ 252.267485] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 252.297718] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4900000000000000, @loopback}, 0x1c) 04:04:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "f3"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$netlink(0x10, 0x3, 0x4) write(r1, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 04:04:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xebffffff00000000]]}, 0x178) 04:04:47 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0xfffffff2, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc2ffffff, @loopback}, 0x1c) [ 252.468735] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:47 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 04:04:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 04:04:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xf2ffffff00000000]]}, 0x178) 04:04:47 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x1ec, 0x0, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xb00000000000000, @loopback}, 0x1c) 04:04:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "e9"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 252.612167] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 252.721671] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc07}], 0x1, 0x61010000) 04:04:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 04:04:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x50000, @loopback}, 0x1c) 04:04:48 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0xf3ffffff00000000]]}, 0x178) 04:04:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xb00, @loopback}, 0x1c) 04:04:48 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xfffffff3, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:48 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 04:04:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "eb"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 253.205833] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 253.208912] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "f2"}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:48 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xffffffe9, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 04:04:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x1f4, @loopback}, 0x1c) 04:04:48 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xfffffff3]]}, 0x178) 04:04:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5, @loopback}, 0x1c) 04:04:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 04:04:48 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xe9ffffff00000000, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 253.458912] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 253.511770] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x400000000000002e, &(0x7f0000000000)={0x6, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x104) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000001c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf8) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x4800, 0x40) setsockopt$inet6_dccp_int(r1, 0x21, 0x5, &(0x7f0000000180)=0x200, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000380)={0x0, 0x80, &(0x7f0000000300)=[@in6={0xa, 0x4e21, 0x5, @local, 0x4}, @in6={0xa, 0x4e21, 0x3, @ipv4={[], [], @broadcast}, 0x4}, @in={0x2, 0x7}, @in6={0xa, 0x4e24, 0xfffffffffffffe00, @mcast1, 0x8001}, @in6={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x20}, 0x8}]}, &(0x7f00000003c0)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000400)=@assoc_value={r2}, 0x8) 04:04:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], 'y'}, 0x79) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:48 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 04:04:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 04:04:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x69dfbfab00000000, @loopback}, 0x1c) 04:04:48 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xffffffeb]]}, 0x178) 04:04:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe803000000000000, @loopback}, 0x1c) 04:04:48 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xebffffff00000000, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x72) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 253.925906] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 253.951380] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x20000}, 0x0) 04:04:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) getpgid(0xffffffffffffffff) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000300)='net/if_inet6\x00') ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0xfffbffff00000001) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040), &(0x7f00000000c0)=0x1) prctl$setptracer(0x59616d61, r0) getpid() 04:04:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5, @loopback}, 0x1c) 04:04:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xfffffff2]]}, 0x178) 04:04:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xf5ffffff00000000, @loopback}, 0x1c) 04:04:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x35) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xf000}, 0x0) [ 254.151080] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:49 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 254.254254] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x3000000, @loopback}, 0x1c) 04:04:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x67) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xf3ffffff00000000]]}, 0x178) 04:04:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) 04:04:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x55550000, @loopback}, 0x1c) [ 254.429025] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) [ 254.540254] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:49 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xffffffff00000000, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x65) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xe9ffffff00000000]]}, 0x178) 04:04:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe000000, @loopback}, 0x1c) 04:04:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 04:04:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x2000000000000, @loopback}, 0x1c) 04:04:49 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x8, 0x1) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e22, 0x2a2e, @loopback, 0x200}, {0xa, 0x4e24, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1b}}, 0x1}, 0x2, [0x5, 0xcde, 0x29ee, 0xffff, 0x78, 0x1, 0x1, 0x10000]}, 0xdd) recvmmsg(r0, &(0x7f00000053c0)=[{{&(0x7f0000001180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000001200)=""/44, 0x2c}, {&(0x7f0000001240)=""/250, 0xfa}], 0x2, &(0x7f0000001380)=""/38, 0x26}, 0xfffffffffffffffd}, {{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)=""/150, 0x96}, {&(0x7f0000001480)=""/45, 0x2d}, {&(0x7f00000014c0)=""/69, 0x45}, {&(0x7f0000001540)=""/221, 0xdd}], 0x4, 0x0, 0x0, 0x401}, 0x239}, {{&(0x7f0000001680)=@ipx, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001700)=""/142, 0x8e}, {&(0x7f00000017c0)=""/120, 0x78}, {&(0x7f0000001840)=""/236, 0xec}, {&(0x7f0000001940)=""/103, 0x67}, {&(0x7f00000019c0)=""/24, 0x18}, {&(0x7f0000001a00)=""/137, 0x89}], 0x6, &(0x7f0000001b00)=""/4096, 0x1000, 0x5}, 0x7}, {{0x0, 0x0, &(0x7f0000003e00)=[{&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/97, 0x61}, {&(0x7f0000003b80)=""/39, 0x27}, {&(0x7f0000003bc0)=""/240, 0xf0}, {&(0x7f0000003cc0)=""/25, 0x19}, {&(0x7f0000003d00)=""/138, 0x8a}, {&(0x7f0000003dc0)=""/54, 0x36}], 0x7, &(0x7f0000003e40)=""/174, 0xae, 0xfffffffffffffffb}, 0x5}, {{&(0x7f0000003f00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000005380)=[{&(0x7f0000003f80)=""/35, 0x23}, {&(0x7f0000003fc0)=""/246, 0xf6}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/71, 0x47}, {&(0x7f0000005140)=""/105, 0x69}, {&(0x7f00000051c0)=""/215, 0xd7}, {&(0x7f00000052c0)=""/141, 0x8d}], 0x7, 0x0, 0x0, 0x4}, 0x7}], 0x5, 0x0, &(0x7f0000005480)={0x0, 0x989680}) bind$can_raw(r0, &(0x7f00000054c0)={0x1d, r1}, 0x10) r2 = socket$inet6(0xa, 0x202000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x11, &(0x7f0000000040)={@mcast2}, 0x20) 04:04:49 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="d9bd499d5360f22a245b3509dfb7b292de80b70019ee9b35f100000000000025ca7eb167dc562b24eee0243fcd62745ebfdfb23fff3a8eb60984d7f1aa8d206a51523815feadcf1cf924ea4e73199a0ac947707cee3b4e82e2a322d3bed10ca00b551cccb23b2b2b473ee14fcdbd70d314d6027bd28e80750e8ae2b4bbf8b73e2ce6e252d9efc32d7c1d18db5c0ef08a2f886248e33ad1842169e3af48daab364886b4e2d413b86c2701010000e93ec44fea9e439905e844bf3f0f075aa74784e17904f2a2c25431a9e53c3d55f90071ef3fefbf28435ab0eaf4e6d0767ada434e12df5222f8c6255c08e8f0488fbe30b3402aae4d77c59a0e2697c33c6819b0a2ca0a9fcb1ab8c1331e7d67a6942606cc92f46a9528d518c8f157e61c530a42f4e51a29374f97915c91b22be9ef7283c9814acdd834d0c0e7f8d1ce450aea2d9894a95dbe98b639aa3bb36b648a47a74f926cab0e873d17c09ff40763", 0x2, 0x0) 04:04:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 04:04:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x24) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 254.934071] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 254.963629] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/arp\x00') ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x9, 0xfff, 0x1}) r1 = creat(&(0x7f0000000140)='./bus\x00', 0xff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10040, 0x0) sendfile(r1, r0, &(0x7f0000000180), 0x10013c93a) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x2f) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000340)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r3, 0x3c, 0x0, @in6={0xa, 0x4e23, 0x4, @loopback, 0x7}}}, 0xa0) removexattr(&(0x7f0000000280)='./bus\x00', &(0x7f0000000300)=@random={'security.', 'vmnet1.user\x00'}) io_setup(0x6, &(0x7f00000001c0)=0x0) io_pgetevents(r4, 0x5, 0x2, &(0x7f0000000240)=[{}, {}], 0x0, &(0x7f0000000400)={&(0x7f00000002c0)={0x7}, 0x8}) 04:04:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xebffffff00000000]]}, 0x178) 04:04:50 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xe9ffffff, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x500, @loopback}, 0x1c) 04:04:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5100, @loopback}, 0x1c) 04:04:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 04:04:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x4) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:50 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='#em3#/\x00', 0x80080000000) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'team_slave_0\x00'}) 04:04:50 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="d9bd499d5360f22a245b3509dfb7b292de80b70019ee9b35f100000000000025ca7eb167dc562b24eee0243fcd62745ebfdfb23fff3a8eb60984d7f1aa8d206a51523815feadcf1cf924ea4e73199a0ac947707cee3b4e82e2a322d3bed10ca00b551cccb23b2b2b473ee14fcdbd70d314d6027bd28e80750e8ae2b4bbf8b73e2ce6e252d9efc32d7c1d18db5c0ef08a2f886248e33ad1842169e3af48daab364886b4e2d413b86c2701010000e93ec44fea9e439905e844bf3f0f075aa74784e17904f2a2c25431a9e53c3d55f90071ef3fefbf28435ab0eaf4e6d0767ada434e12df5222f8c6255c08e8f0488fbe30b3402aae4d77c59a0e2697c33c6819b0a2ca0a9fcb1ab8c1331e7d67a6942606cc92f46a9528d518c8f157e61c530a42f4e51a29374f97915c91b22be9ef7283c9814acdd834d0c0e7f8d1ce450aea2d9894a95dbe98b639aa3bb36b648a47a74f926cab0e873d17c09ff40763", 0x2, 0x0) 04:04:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xf2ffffff00000000]]}, 0x178) [ 255.270566] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 255.299197] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:50 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) 04:04:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0xf0) 04:04:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x45) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:50 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xffffffeb, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x18020000, @loopback}, 0x1c) 04:04:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x4, @loopback}, 0x1c) 04:04:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xe9ffffff]]}, 0x178) 04:04:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x3b) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0xfffffff0) [ 255.533422] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:50 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xfffffff2, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) [ 255.615721] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x8dffffff00000000, @loopback}, 0x1c) 04:04:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x73) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:50 executing program 1: r0 = socket(0x18, 0x0, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x40, 0x0) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000100)) accept4(r0, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80, 0x0) socket$xdp(0x2c, 0x3, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000140)={0x7, 0x6d, 0x2}, 0x7) 04:04:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xf3ffffff]]}, 0x178) [ 255.803145] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x80fe, @loopback}, 0x1c) 04:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0xf0ffffffffffff) 04:04:51 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xf3ffffff00000000, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x74) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xffffffe9]]}, 0x178) 04:04:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff00, @loopback}, 0x1c) 04:04:51 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r3, 0x0) write(r3, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 04:04:51 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) read(r0, &(0x7f0000a16000)=""/71, 0x47) 04:04:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xffffffff00000000]]}, 0x178) [ 256.202197] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 256.213586] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x218, @loopback}, 0x1c) 04:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x100000000000000) 04:04:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x61) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfe80000000000000, @loopback}, 0x1c) 04:04:51 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xf2ffffff00000000, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000240)='cgroup\x00', 0x0, &(0x7f0000000340)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x5, 0x3}, 0x4) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000140)=0x200000000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x82, 0x0) getpeername$netlink(r1, &(0x7f0000000200), &(0x7f0000000280)=0xc) write$P9_RREADLINK(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8f6c0000000000000000000000000000"], 0x224) 04:04:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xebffffff]]}, 0x178) 04:04:51 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) [ 256.440195] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 256.453632] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0xffffff7f) 04:04:51 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r3, 0x0) write(r3, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 04:04:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x31) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:51 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xebffffff, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xa9f7020000000000, @loopback}, 0x1c) 04:04:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x5555000000000000, @loopback}, 0x1c) 04:04:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0xf0ffff) 04:04:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x48) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:51 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xf2ffffff, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0xf2ffffff]]}, 0x178) [ 256.726726] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 256.752791] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:51 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000006000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="01000008", @ANYPTR=&(0x7f0000005f40)=ANY=[@ANYBLOB], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x4400) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f00000001c0)=""/87) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040)=0x401, 0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB="11634840", @ANYRES64=0x0, @ANYBLOB="0200000005000000"], 0x0, 0x0, &(0x7f0000002000)}) 04:04:51 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0xf3ffffff, 0x0, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x5a) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x40000000, @loopback}, 0x1c) 04:04:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0xf000) [ 257.037314] binder: 19753:19754 transaction failed 29201/-22, size 0--1 line 2970 [ 257.042028] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 257.074214] binder: BINDER_SET_CONTEXT_MGR already set [ 257.118221] binder: 19753:19765 ioctl 40046207 0 returned -16 [ 257.154305] binder: undelivered TRANSACTION_ERROR: 29201 04:04:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x1000000) 04:04:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x6000000, @loopback}, 0x1c) 04:04:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x71) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0x0, 0xfffffff2]]}, 0x178) 04:04:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x20000, @loopback}, 0x1c) 04:04:52 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="d9bd499d5360f22a245b3509dfb7b292de80b70019ee9b35f100000000000025ca7eb167dc562b24eee0243fcd62745ebfdfb23fff3a8eb60984d7f1aa8d206a51523815feadcf1cf924ea4e73199a0ac947707cee3b4e82e2a322d3bed10ca00b551cccb23b2b2b473ee14fcdbd70d314d6027bd28e80750e8ae2b4bbf8b73e2ce6e252d9efc32d7c1d18db5c0ef08a2f886248e33ad1842169e3af48daab364886b4e2d413b86c2701010000e93ec44fea9e439905e844bf3f0f075aa74784e17904f2a2c25431a9e53c3d55f90071ef3fefbf28435ab0eaf4e6d0767ada434e12df5222f8c6255c08e8f0488fbe30b3402aae4d77c59a0e2697c33c6819b0a2ca0a9fcb1ab8c1331e7d67a6942606cc92f46a9528d518c8f157e61c530a42f4e51a29374f97915c91b22be9ef7283c9814acdd834d0c0e7f8d1ce450aea2d9894a95dbe98b639aa3bb36b648a47a74f926cab0e873d17c09ff40763", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 04:04:52 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0xfffffff2, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:52 executing program 1: r0 = socket(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2000, 0x4) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000001c0)=0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000140)={0x4}, 0x2) close(r0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="4184cda2abd78014c28145c570c205f9", 0x10) 04:04:52 executing program 1: r0 = socket(0xa, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2000, 0x4) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000001c0)=0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x104) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000140)={0x4}, 0x2) close(r0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000200)="4184cda2abd78014c28145c570c205f9", 0x10) 04:04:52 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0xe9ffffff00000000, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x20000) [ 257.446814] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 257.465848] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x15) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0x0, 0xebffffff00000000]]}, 0x178) 04:04:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x49000000, @loopback}, 0x1c) 04:04:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x801000d2, @loopback}, 0x1c) 04:04:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x200000) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000080)={0x1}) getsockopt(r0, 0x114, 0x2721, &(0x7f0000000040)=""/13, &(0x7f000033bffc)=0x572) 04:04:52 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0xffffffff00000000, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x2) 04:04:52 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 04:04:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x9) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 257.708014] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 257.737183] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0x0, 0xf2ffffff00000000]]}, 0x178) 04:04:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xc4ffffff, @loopback}, 0x1c) 04:04:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303022a93030303030303030303034303030307ca460bcf16155a314", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x0) symlinkat(&(0x7f0000000080)='./file0/file1\x00', r1, &(0x7f00000001c0)='./file0\x00') read$FUSE(r0, &(0x7f00000030c0), 0x1000) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}}}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) 04:04:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0xffffff9e) 04:04:52 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0xf3ffffff, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xff0f, @loopback}, 0x1c) 04:04:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0xf) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 257.965105] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:53 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0xe9ffffff, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:53 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0x0, 0xffffffff00000000]]}, 0x178) 04:04:53 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 04:04:53 executing program 1: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@buf={0x8, &(0x7f0000000140)="6186eeeec21a713a"}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x890c, &(0x7f00000000c0)={"696662300200", @ifru_settings={0x0, 0x0, @raw_hdlc=&(0x7f00000001c0)}}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000) socket$bt_rfcomm(0x1f, 0x1, 0x3) socket$inet_smc(0x2b, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=""/63, 0x3f) 04:04:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x2000000000000) 04:04:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xe8030000, @loopback}, 0x1c) [ 258.095068] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x200}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}], "13"}, 0x200005f9) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 04:04:53 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5bd9f4be, 0x3, 0x3, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200, 0x100000000}, [{0x0, 0x0, 0x2, 0x0, 0xf2ffffff, 0x517d, 0x0, 0x7fffffff}], "13b82e28c7f723d99db91993b60f67feac99863e80c3ba94c9673f674ffd8b8a3de06610ad1646a067e78c8c80a75acfa500a7ffb4fcde489eabb420c37ad7b1fba043a7f83ee0f8a3821e97dc66e2fa751bee5b565ee746806131d61c45569b1bd23a678a4f6a93a099e15de9c35fad79c461f5", [[]]}, 0x1ec) 04:04:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x9effffff00000000) 04:04:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0x3c4) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000081000d000000000000000000020000"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) [ 258.196969] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0x3c4) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000081000d000000000000000000020000"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) 04:04:53 executing program 3: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 04:04:53 executing program 6: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x0, 0x1) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfb, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x200}, [{0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b4, 0x7fffffff}], "", [[0x0, 0x0, 0x0, 0xf3ffffff]]}, 0x178) 04:04:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0x3c4) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000081000d000000000000000000020000"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) 04:04:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xffed020000000000, @loopback}, 0x1c) 04:04:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0xfe800000, @loopback}, 0x1c) 04:04:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0x3c4) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000081000d000000000000000000020000"]) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) [ 258.684928] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 258.717452] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x51, @loopback}, 0x1c) 04:04:53 executing program 1: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000000)=0x9) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @rand_addr}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[{0x8, 0x3}], 0x1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)=ANY=[@ANYBLOB="040000000800000000cdde8dfc00000005000000000000003f000000000000000001000000000000154300000000000006000000000000000600000000000000f7ffffffffffffff658a835ed8008f1f88512cf5e621cc4500f542"]) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r2, &(0x7f0000000740)="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", 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) 04:04:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x400000000000000, @loopback}, 0x1c) [ 258.918590] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 258.949598] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:04:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x2004808d, &(0x7f0000000100), 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) sendto$inet6(r0, &(0x7f00002a0b14)="f6", 0x1, 0x20000000, &(0x7f000072e000)={0xa, 0x2, 0x900000000000000, @loopback}, 0x1c) 04:05:00 executing program 1: select(0x40, &(0x7f0000000000)={0x10001, 0x4, 0x7f, 0x2, 0x4, 0x1f, 0x6, 0x7f}, &(0x7f0000000040)={0x4, 0x5, 0x6, 0x5, 0x9, 0x2, 0xbc, 0x8efa000000}, &(0x7f00000000c0)={0x1800000000, 0x7, 0x9, 0x9, 0x80000000, 0x3, 0x8, 0x101}, &(0x7f0000000100)={0x0, 0x7530}) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000040), 0x10) io_setup(0x7, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)}]) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x1, 0x0, 0x4}, 0x20) [ 284.433687] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 363.267523] rcu: INFO: rcu_sched self-detected stall on CPU [ 363.273380] rcu: 0-....: (105000 ticks this GP) idle=f46/1/0x4000000000000002 softirq=84788/84788 fqs=19888 [ 363.283597] rcu: (t=105008 jiffies g=180537 q=1264) [ 363.288790] NMI backtrace for cpu 0 [ 363.292406] CPU: 0 PID: 19901 Comm: syz-executor0 Not tainted 4.18.0+ #106 [ 363.299403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.308737] Call Trace: [ 363.311306] [ 363.313461] dump_stack+0x1c9/0x2b4 [ 363.317077] ? dump_stack_print_info.cold.2+0x52/0x52 [ 363.322254] ? lock_release+0x9f0/0x9f0 [ 363.326214] ? trace_hardirqs_off+0xb8/0x2b0 [ 363.330631] ? lapic_can_unplug_cpu.cold.29+0x3f/0x3f [ 363.335818] nmi_cpu_backtrace.cold.3+0x48/0x88 [ 363.340475] ? lapic_can_unplug_cpu.cold.29+0x3f/0x3f [ 363.345664] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 363.350929] arch_trigger_cpumask_backtrace+0x14/0x20 [ 363.356104] rcu_dump_cpu_stacks+0x175/0x1c2 [ 363.360513] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 363.365520] print_cpu_stall.cold.78+0x2fb/0x59c [ 363.370266] ? rcu_dynticks_snap+0x30/0x30 [ 363.374491] ? rcu_test_sync_prims+0x30/0x30 [ 363.378886] ? kasan_check_read+0x11/0x20 [ 363.383019] ? rcu_is_watching+0x8c/0x150 [ 363.387151] ? rcu_pm_notify+0xc0/0xc0 [ 363.391032] rcu_check_callbacks+0xd4a/0x15a0 [ 363.395511] ? __lock_acquire+0x7fc/0x5020 [ 363.399738] ? rcu_cpu_stall_reset+0x220/0x220 [ 363.404309] ? graph_lock+0x170/0x170 [ 363.408094] ? find_held_lock+0x36/0x1c0 [ 363.412148] ? kasan_check_read+0x11/0x20 [ 363.416282] ? __acct_update_integrals+0x127/0x510 [ 363.421201] ? trace_hardirqs_off+0xb8/0x2b0 [ 363.425595] ? rcu_pm_notify+0xc0/0xc0 [ 363.429466] ? trace_hardirqs_on+0x2c0/0x2c0 [ 363.433869] ? raise_softirq+0x1bb/0x420 [ 363.437915] ? raise_softirq_irqoff+0x2e0/0x2e0 [ 363.442570] ? acct_account_cputime+0x63/0x80 [ 363.447053] ? account_system_index_time+0x32b/0x5c0 [ 363.452141] ? account_guest_time+0x460/0x460 [ 363.456625] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 363.462150] ? hrtimer_run_queues+0x70/0x390 [ 363.466546] ? run_local_timers+0x172/0x1f0 [ 363.470855] ? timer_clear_idle+0x50/0x50 [ 363.474993] ? account_system_time+0x7f/0xb0 [ 363.479389] ? account_process_tick+0x76/0x240 [ 363.483959] ? rcu_is_watching+0x8c/0x150 [ 363.488097] update_process_times+0x2d/0x70 [ 363.492406] tick_sched_handle+0x9f/0x180 [ 363.496545] tick_sched_timer+0x45/0x130 [ 363.500594] __hrtimer_run_queues+0x3eb/0xff0 [ 363.505097] ? tick_sched_do_timer+0x1a0/0x1a0 [ 363.509667] ? hrtimer_start_range_ns+0xcd0/0xcd0 [ 363.514504] ? pvclock_read_flags+0x160/0x160 [ 363.518985] ? trace_hardirqs_on+0x2c0/0x2c0 [ 363.523384] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 363.528386] ? ktime_get_update_offsets_now+0x3db/0x5d0 [ 363.533747] ? do_timer+0x50/0x50 [ 363.537200] ? kasan_check_read+0x11/0x20 [ 363.541331] ? trace_hardirqs_on+0x2c0/0x2c0 [ 363.545730] ? do_raw_spin_lock+0xc1/0x200 [ 363.549956] hrtimer_interrupt+0x2f3/0x750 [ 363.554187] smp_apic_timer_interrupt+0x16d/0x6a0 [ 363.559019] ? smp_call_function_single_interrupt+0x5d0/0x5d0 [ 363.564891] ? interrupt_entry+0xb5/0xf0 [ 363.568938] ? trace_hardirqs_off_caller+0xbb/0x2b0 [ 363.573938] ? trace_hardirqs_off_caller+0xbb/0x2b0 [ 363.578936] ? trace_hardirqs_off+0xb8/0x2b0 [ 363.583331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.588170] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 363.593172] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 363.598175] ? task_prio+0x50/0x50 [ 363.601708] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.606540] apic_timer_interrupt+0xf/0x20 [ 363.610770] [ 363.612997] RIP: 0010:_raw_spin_unlock_irq+0x56/0x70 [ 363.618086] Code: f1 87 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 1d 48 83 3d db 98 3d 01 00 74 11 fb 66 0f 1f 44 00 00 <65> ff 0d a3 c9 4d 79 5b 5d c3 0f 0b e8 09 8f 07 fb eb dc 0f 1f 80 [ 363.636971] RSP: 0018:ffff8801a9d8faa8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 363.644667] RAX: dffffc0000000000 RBX: ffff8801b2dda1a8 RCX: 0000000000000000 [ 363.651948] RDX: 1ffffffff0fe379f RSI: 0000000000000001 RDI: ffffffff87f1bcf8 [ 363.659203] RBP: ffff8801a9d8fab0 R08: ffff8801bae90640 R09: 0000000000000000 [ 363.666460] R10: 0000000000000000 R11: 0000000000000000 R12: 000000000088a2c0 [ 363.673717] R13: dffffc0000000000 R14: 000000000088a2c0 R15: ffff8801b2dda1a8 [ 363.680986] ? _raw_spin_unlock_irq+0x27/0x70 [ 363.685469] mousedev_write+0x19d/0x840 [ 363.689436] __vfs_write+0x117/0x9d0 [ 363.693138] ? __fget_light+0x2f7/0x440 [ 363.697097] ? mousedev_free+0x70/0x70 [ 363.700974] ? kernel_read+0x120/0x120 [ 363.704847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 363.709594] ? schedule+0xfb/0x450 [ 363.713117] ? lockdep_hardirqs_on+0x421/0x5c0 [ 363.717687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.723213] ? security_file_permission+0x1c2/0x230 [ 363.728216] ? rw_verify_area+0x118/0x360 [ 363.732352] vfs_write+0x1fc/0x560 [ 363.735883] ksys_write+0x101/0x260 [ 363.739498] ? __ia32_sys_read+0xb0/0xb0 [ 363.743547] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 363.748638] __ia32_sys_write+0x71/0xb0 [ 363.752602] do_fast_syscall_32+0x34d/0xfb2 [ 363.756914] ? do_int80_syscall_32+0x890/0x890 [ 363.761484] ? entry_SYSENTER_compat+0x68/0x7f [ 363.766052] ? trace_hardirqs_off_caller+0xbb/0x2b0 [ 363.771053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.775880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.780710] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 363.785716] ? prepare_exit_to_usermode+0x291/0x3b0 [ 363.790721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.795555] entry_SYSENTER_compat+0x70/0x7f [ 363.799948] RIP: 0023:0xf7f21ca9 [ 363.803301] Code: 55 08 8b 88 64 cd ff ff 8b 98 68 cd ff ff 89 c8 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 1c 24 c3 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 363.822185] RSP: 002b:00000000f5f1d0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 363.829879] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000580 [ 363.837147] RDX: 00000000200005f9 RSI: 0000000000000000 RDI: 0000000000000000 [ 363.844406] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 363.851663] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 363.858916] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000