[ 11.403683] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.062728] random: sshd: uninitialized urandom read (32 bytes read) [ 16.295856] audit: type=1400 audit(1571090863.637:6): avc: denied { map } for pid=1769 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 16.341074] random: sshd: uninitialized urandom read (32 bytes read) [ 16.912677] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.211' (ECDSA) to the list of known hosts. [ 22.638496] random: sshd: uninitialized urandom read (32 bytes read) 2019/10/14 22:07:50 fuzzer started [ 22.731374] audit: type=1400 audit(1571090870.077:7): avc: denied { map } for pid=1784 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 23.226121] random: cc1: uninitialized urandom read (8 bytes read) 2019/10/14 22:07:51 dialing manager at 10.128.0.26:43755 2019/10/14 22:07:51 syscalls: 1355 2019/10/14 22:07:51 code coverage: enabled 2019/10/14 22:07:51 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/10/14 22:07:51 extra coverage: extra coverage is not supported by the kernel 2019/10/14 22:07:51 setuid sandbox: enabled 2019/10/14 22:07:51 namespace sandbox: enabled 2019/10/14 22:07:51 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/14 22:07:51 fault injection: CONFIG_FAULT_INJECTION is not enabled 2019/10/14 22:07:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/14 22:07:51 net packet injection: enabled 2019/10/14 22:07:51 net device setup: enabled 2019/10/14 22:07:51 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist [ 25.217290] random: crng init done 22:08:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x34, 0x26, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x4}}}]}, 0x34}}, 0x0) 22:08:49 executing program 0: creat(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000140)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)='s', 0xe}], 0x1, &(0x7f0000000400)=[@timestamping={{0x14}}], 0x18}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000040)={0xf, 0x1f, 0x0, 0x7fff}, 0xf) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x165) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x208202) r2 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)={0x68, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x2, @link='broadcast-link\x00'}}}, [""]}, 0x68}}, 0x80000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x3c) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000004c0)={{0x32, @remote, 0x4e24, 0x3, 'wlc\x00', 0x0, 0x3e710ffa, 0x28}, {@loopback, 0x4e24, 0x2, 0x80, 0x80000001, 0x8}}, 0x44) 22:08:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 22:08:49 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x28020400) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 22:08:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x0, 0x0, [{r0}, {}]}) 22:08:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x4c}, 0x1c) listen(r0, 0x0) [ 82.203238] audit: type=1400 audit(1571090929.547:8): avc: denied { map } for pid=1837 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 22:08:52 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x3, 0x0, 0x8020001) 22:08:52 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) creat(&(0x7f0000000040)='./bus\x00', 0x0) 22:08:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x13, &(0x7f0000000880)={@remote}, 0x20) 22:08:52 executing program 0: syz_emit_ethernet(0x62, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x2c, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}]}}}}}}}}, 0x0) 22:08:52 executing program 0: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x17) 22:08:52 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYPTR64], 0x8) write$P9_RREAD(r0, &(0x7f0000000400)={0x1001, 0x75, 0x0, {0xff6, "56fafe48702e4f1fa592e4cd9737dc7849b362bef6ea7fa6654f1b553e060b53fa0645df1fc9d3acd4f2b79ef6068caaffefa7d195d578daa0b56f8e4753a4c186554ab23f304ce757972b2d0144ca94a8baa72eded80ada3b0412046b8861d22b8b6645f34a20751552998044dea7d451fab2f2f16afedf855c0cf7d4193aca8a2e77e1a06b22a5d74a76dd1fc3f7582dbbeafa5adc3f6fca8001f16054b676669c948a3000cb16487061c3b5e80defe256b80ea414888805e99cef872571fb0994c06a509b8ce14e328131833d3a56224238e8aaa75400c7c1cdbefdaffd0283a04aa5dbca0dc377f9f426a36d12c722d0cc177d3a9048c9f45f5dd63c7e2d91992ec1d8c77ef520c378f81f247fb9cb548f56cda837b47de8775aa94a1ad41e4766b03235afc770b4b310a18748ab0189e616d42de7d96a626db3d6753cce6298eebb1772ba2e37f6f1dd2fad75b6366d4ef06a5b95dfef59da99256e87f8d3d0173d17f9017a302aa88b7484c4fe248bdc56c9ba10acfadff1ede376cf3b9efb47edda2a62fae054c666529853534772bb7638738988254aae25f6f6b3a8af839d517dbc30c6f0d836efbdcd75181eeee1dc853ca7de9e32e5a3224425276453ae0c41ca45bfab77715ef44d7d49712accb5ced7a150d5fafc86c1ad7fb9875e73dc98c85a11a638cb2c2f937c955591f2fc42b53145f8789f2f8ead3bcedcace4e44afbd6052752d910c0f56308f34f63f25f1afc08f6d63d6df4dfdaf6be57d60d9a17034aa309b7084ed4c1086ca756f7a166ecebe6a9097ce275c4d91aeeb887a0b0d9dc6259c692ef263dd84d733c85e50d12d09b3c835c43e692ccb135b6be1eb97a3b72d32771d001e7d1ab358e0d2796a066c94b7fe7927fd7be046a6afb1f9c66e59fb17ee8f36f20cf2a45cddcc2520502b04fe20db9f75ad9a89225faa7845be1205078af69c08a5b6357b17b2a88966cca03dca1771ea0a1a38533d427a6b1bc3138b32a81c918762217469f773fa9cb1cb86e45772e170778e80c6d20f17d789b4bd71b4ab806ad757259ceb8d8382491a82a2c80e609e231e91b22fc0dcb7ab65a3c54189c9d1d2595ba88f8d384dceec342603531f06d9cb4b9b38decfb4a3a7707c1aa2f35fd38f73f80b5ee18ca0b71c8b5b84bd745a9b74c31c1ae2964e4dacfaceaf43de6aae60636c231f9a3d0c2b69ccf6d54ce727b35144d630233931335a280c2a05e20408b8366566df824e92ed0bcebd6051912e5c143d75d101a7c5b216fdb2bd848eb813f290776d1470c65545d2f3e83681800e54f7d813cf8a12d12ba2fad9047f7828f553d644a3afae99d1ef1b85d2c7a94c8742b02c796738f50253b1dc52c7fdbfd8f3753ab9c232597a05104b772690420cada3a8a1fe21ec1deca825f79335f44e1a979a2c34971ce11fe60b63112c4d68be99e28fcc797e8f9f6ff28d112c6a15ea4ec6aad9bfd5e983dc30171d3a2fc523e932f53602136aeb27b61986969888b2f3dd14536fec86e2ae9bd5cacd3d8490fffbf03d79df84934e02cd69bb48ee7f3f422dd830a5e5a25c31a928eca5131983621f6a9d277913276471dd56e952f4a6bf909d1812a815bb95eb5f74e259a6aa01002dcf17ca47df343ad6f09862730c244b924f93e9633b446c7017222f002e3d92a0d9f547b9b088cf7a49ee6f3624d1c797bfe70f84dfb5ec6fdb5a148d078d61e616cba9e05c36493bb88bc5f1492cc12165b21d0fdfa212f977bfb99f51cf25d1b0b1807c1202ffc3f45c673d0ddebda02efd8b839a42bf29e2d06c93d8a99f23bf8da8e9c5ac40de28eee5f2255692cd9680f069997a2ad05e7ed4810611da260c57e28b1b4e518b8731a3cfc09afe7c2a69965c6b9f34aa4d7897908a8d81c1c51488075d75e2fb57b8cb1813491672e031ede52171216f2bdb09cb36eaa7c19d822faf743e8af4d16c324b57525e4390a07a982a012fbd789fb812b95a67011922b59b658f256f5780314b335ac81ca91aac77cc29cfaf9a1cb355194a71f89d0e332d41a5e2cce373453eaa6b49be1aa6ec2cf697b072db9ec4af595e130ae1e7e3398ab1c9f51801cf7b5c99cc04c3228a5750bdc76787ccc93bc25ac496e37cafdfcd6430db1d7a40210c664ffc270694845448947fd249543f50cd58c0715aa0766caeb22752d82442d87c594dcd816cc47f9863fa1ab031a62e9ecdcbb2a8d4b245fc422890276259bbbfd40c8f766d02d68264f1cd93df47786299206848564e8253326a9e9b833f2ab6b218dea6347e12b0871f48c077550aa3158ff16fd14dd7be824dc941c54881e1b467a787160bdf8b5bc514a6901b8e5c9850670b8ba24e4387c6460152bbffcdadc6fd901564274b59f29cec113147238831fc2dbdea8a89937ae8888be2a74712a2ae72b08f6eeadedf71f69cd8a0b9c5e6e583ca13816875075c2e936b6ef9fb2b1d99fdaedf76113ee771b8698c6cb79b2c9d7a699b8b84b80ffa4fc5601dfd142accefeb1429d447fd3c7a7e5e9f1729e17eb0450d13c2ee6e417f7911186518a780df702c590e9d7167552bc04a6270097771c8fab8d42c75d0a18ac2efc0238ddfb8a45468f5b9e849c6c428e19194be0fe27f15c656695e24c0dd162612c82de3cbe081418d154b0b2f5be8c9ea61a6879ffa1a538eb00e2eb29cbb9d60ac00e1d97ab8029ed0ccadc2cb5a5c17b0cf9a02214a3116d306c87660a67cd8c2ba0d67e74172edc53eed91ed39719f62eb85a772da1a46a1ab57f4348a5d967873da12df6babf8bf55f243c2cd5f18b034de1224cde9efb03ba441f43b0f0d5687601be414a115fda714414cb5c60b045dd325633df4d568bf18bcfbb4448960a5c90536935b2b1ec4b35f691fd2168a126dfa218106f6b7cb427b24d9985d31c0cd9ba6dcbd969e7d22e0d8c7241356f09aba6a31e64e26af30e2b1b59c5f359293dec276b2205bf94f1c73d59786b3a02daf760895340324287ac32a68ddb89b428446c7aa4638b2a26421aa7ef68412ce5a388f4368dffd6f4e07d84207a7f3135c0f928e4da9703fd4d13b79691354e5941f66fa3b2f082ef78e8b3e6897373c9ce8b3bf32d466e60ffec34fad310b104bea4a73ed8c50c22ccc93eb9a7e192ff3ca2361298f6212bcfed79fdd97e84527fa9dfdf9c2012b4ac5a471c6b0374ad9f1b019bf0456dbbfc040c35f745213026a279c776bfef9c0310a538cf8a473375cae87f76254c05a041f4c86758e53b39fc026d613a7509606a03284b4fcc2ed591c6fd668be681b2bde9f7f32c59ad11d0f51c4f2cd108e4fd2c25f30e0fe4989d05325259857aa6f1e7d277bc31d0d6a5dfb7a205639148c91d2abb1708018b3afeced214fae96c9624192bf274b97916a9a88a47a321b753a0f879e04f24e86819dd0ea37529b1e524ab2112f64dc56c866aac38a21ca97c0fbace6f30d99f8785cb41378cee310601cd326a719bba2bf1a18810937b31614e607cb24d6f0cd2bc7992897801e05867e4d4105a92a1e2db22127be14bf689c384bee89b1bfeffd2cdeb66fd3f6a521bc32964a497c2432c6fcb5ccdd3c664d19861971ca0a53ed1561a65990d709b299c6788e4be60176f52992ca4904d451b5c4fa5fa1332f4bb8e63c15fb136355c8f2c9831ef7bb42fc10120cf05c462adbf606a2d17ee5ce255f7c171e5d3405ddc6ad041651778eb5cbd44e55436eb3a7dddd34d84390b5891a4ee3a5a2246ea85cbe1f7ab1a9ca96a4a873bad36061bf73537cc2f2745ef13905d75b1ae2995d668838cf5c807ccfb4702b2a0450baa17054b4fe374308f8c294129695a02f47af4d149283928dbc6fe83bf3821d894dd56e692b50734d0542cb236d596d851b6a2a898f0f801094978697e587f6478e26405451b8bc9c7b5b916782f5eae1f55b90c41dd126da285bd6e5675271e38a5369c2d7323fd365ab639bcccc0fb5ea5a9129bda444c7caa1c268765d7ae55d07df987216197290749bb57747dc742f4dad3f879bd11d357ae75750b0b7e51c792a046d10a7c5020076edbcc09d198a405819b54ba68235914e75e75f579792c66b203b730fff761810a4a85962bb3a2d6c30f86803b78b9cc19f89ac4266e36d59810cd3de0990ff63008ee6a20fe0f238ee5dd001c623f3f61655aaeda4e88e477672493cd391f54cd7d59922cde21d3361b258854e831918dd27233772daf92fdd2d56238f6addaf96d2cce45f1bfd0cba00ccbb1dd5b9bcfd4ee2937d1ca96f1cd805811de18eded93303ea4109af45b520a87123473ed5c3222ab6e68eec4e9e5e1659739e4bd495d887c29eb6a0fa737e89e149ebe6a4ab5ee2e0e5bdb57f682a8ad01c60f33952868be3e9329e0d78b29033cba3c822b064efd414b00dc76eff6798fdfbfbdabb5e05e27417a2c3738081436ec1c7cd442a231db6afa3c212240928cbf3dbfaef4ce101f15e1b44b7164ce9f52918e269a98cab1870248d0d7417a3bcadc7b2bca2ed020b59ace06888b826da19a30c636cd5118df5e7951a6d439e3715900b146399b0bb7b95825dd7e9d7e29f6643921b345cca9bcf521bb5431e0e58c1fcce7f5b81dfcf9918aa9ed710ca3413416a6a332ea3d27f79cfac752bbc46eb811808218bf0d394e22e79587250c251aa08ed83ce8bb16e5443ec73b169f5eb517c68c24a0e95dc00d121f0a405d37677c827e6010064151a25d3f1c6e68ca71a1204cc77fc4fe83f0e67aa9b64b3e79b2eea8cd3620f72e26f317f2caf17353fb5a65fc1d97050d1e5401641b159c2e1421ddfe97cd77175aaa5c054b90a25639a0029d8f80130dd8fb668d0f36db644713cb7c66f092da3c6cd2fbf8a79b4de59a175f0da662d6404a94524e937851f037d6ad21e8483b15d79208d28da8090c92409fe9bde5e014a5613c5d3d86405e263cb214381d6c5cdc0e7e95e0ab00aebfb8def86e808004a73b90aa9ab1a61867ac1b2753d191a158e6cd0a1c99723d0410c431f961b6dc79fbe3b4fa04cf1e6c2e5d6648f2b1b5477a63c14461f297fa20041a098f4d0069c71b234831eb8789f90352507c5b93e3745701ee3730d5a851c452d0d60df1ae29f0fac9049a45904a83984a5bef51703f8b88cf392c0ce22c4cded1155281307a2a273eded0851d06d4650b5beff200ba989d00d2e68b9c9d06e901dc1f4e424970a30afbec0c27ce11f96ad8098f81a968531e6a718cafd10a108fd16a66656f0eb5352ac654349859ab0e82d8c536c324320e502407d195feee9c157f741decc9f4ef097c4baec31b09e4f906025538eefc9bfc34352d375bc8f5ed69ddc0abaed0276ed19b46896966fbb650574622775a8615dd714637cdd1c122d8192cda536ea44c5fa80b5529a48f73b35db1b3de550efbb51657073a1420a1188f34e5f88db7a89a144b3fedaed7ffb008559aa801b068fdd37d4117004be10704805481fb42234ed679db3b027ac77208b801e5b56882161bc8a80991d2987ed7e7f86498ade9d9bae41e1408f4b65991496b91c985f3f6961242a7bec3cc6901110afbf6d4684f690afdae0d2b537e7d8e5fb7d96e7b9d0d58ef4dd6f7eec8f00a2b5fb392971c5f347d082b07bef75d7e583a0029882521ba31b5f0b01ba12dc69adf39ce3c6545e4cf2ccb66b36f2ad023375a9745421d4d4c539c1cf1d20269e24725d8ff434801a99d4c5bd02ad6afbca3556b74536bb3a6970fc8d1f79aeb99710ad3d8061448f359b6"}}, 0x1001) [ 85.153435] syz-executor.0 (2742) used greatest stack depth: 23472 bytes left 22:08:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0x2, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="8202adfdffffffffffffff6530130fb9aa23d0571454d78a2a197a386207000000008295955984c87910bf093f68c11700287ead4bcb777fa69dfceac2a84e6abca64896bc5e57c6388bbd2ad88b2951b15801360bcd4c0a162b58b55c62bffa4d012ae46ac41e6bf3bf554799b9b800ed52e0b85a85e25bfb258557d60f13ad30505e8d53f8a4aeef9d612f871f4385f04157795ea4a5c59a3a9fa202361ca1d8cac7dbbc5b65c6593d2870b4122cd235000000000000000000000000000000000000000000000000000000e0d853fcd94c20b9ca1cdaea80e8b36019dea90d160e9b2048a3c0b5495a204b24be82ab7a1d"], 0x10) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = dup(r0) sendto$inet6(r2, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) 22:08:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 22:08:53 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r7 = fcntl$getown(r1, 0x9) fcntl$lock(r6, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r7}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='iPVS\x00') getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000044c0)={'ip6gre0\x00'}) 22:08:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) 22:08:53 executing program 0: fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) 22:08:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x100, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7f0000000000000000000000000300000000000000000000000000000000000000ffffffff0000000000000000400000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001900000009000000000000000000106cf4aa4ac99e8d000000006c6f000000009d000000000000000001010000000000000000000000100000fa000000000000000000000000a85f00cc99b4d1000000000005000000aaaaaaaaaa0000020000000000007000000070000000a0000000"]}, 0x178) 22:08:53 executing program 5: r0 = socket$inet6(0xa, 0x10000000003, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") quotactl(0x0, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) 22:08:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b70000000000000038000000001f00001f010000000000009500000000000000"], &(0x7f0000003ff6)='OPL\x00', 0x0, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffdde}, 0x48) 22:08:53 executing program 1: r0 = socket(0x1f, 0x3, 0x0) r1 = socket(0x1f, 0x3, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000000540)=[@rights], 0x10}, 0x409) 22:08:53 executing program 0: syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f0000000200)) 22:08:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) [ 86.536309] audit: type=1400 audit(1571090933.877:9): avc: denied { create } for pid=2792 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:08:53 executing program 0: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) dup(r0) r1 = socket(0x2, 0x1, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x10) shutdown(r1, 0x2) 22:08:53 executing program 4: prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1b) [ 86.583439] audit: type=1400 audit(1571090933.907:10): avc: denied { write } for pid=2792 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 86.611832] audit: type=1400 audit(1571090933.907:11): avc: denied { prog_load } for pid=2812 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 86.636768] audit: type=1400 audit(1571090933.927:12): avc: denied { read } for pid=2792 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 22:08:54 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r7 = fcntl$getown(r1, 0x9) fcntl$lock(r6, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r7}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='iPVS\x00') getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000044c0)={'ip6gre0\x00'}) 22:08:54 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000002c0)={0x0, 0xd48fe6ae8f607a35, &(0x7f0000000340)=[{&(0x7f0000000200)="2400000020007be11dfffd946f610500020000061f0000000000080008000b000400ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 22:08:54 executing program 5: r0 = socket(0x18, 0x3, 0x4) setsockopt$sock_cred(r0, 0xffff, 0x11, 0x0, 0x0) 22:08:54 executing program 0: r0 = getpid() ptrace$getregs(0xffffffffffffffff, r0, 0x0, 0x0) 22:08:54 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 22:08:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x0, 0x5}, 0x20) 22:08:54 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000000000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x1000000, &(0x7f0000000100)="b901000000040000009e40f089061fffffe100004000632177fbac141414e9a33fa1be3e7d2a182fff", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:08:54 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 86.919468] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 86.938109] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmod(r1, 0x0) 22:08:54 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 86.980843] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0xbc5201bd52ffb6c4, 0x0, 0xffffffffffffff0e) [ 87.018179] audit: type=1400 audit(1571090934.357:13): avc: denied { prog_run } for pid=2869 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 87.069501] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:54 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r7 = fcntl$getown(r1, 0x9) fcntl$lock(r6, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r7}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='iPVS\x00') getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000044c0)={'ip6gre0\x00'}) 22:08:54 executing program 2: syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff86, 0x4}}}}}, 0x0) 22:08:54 executing program 5: futex(0x0, 0x2ae28b671dc30eaf, 0x0, 0x0, 0x0, 0x0) 22:08:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001080)=[{{&(0x7f00000004c0)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000600)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @dev}}}], 0x20}}], 0x1, 0x0) 22:08:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@ipv4={[], [], @multicast2}, 0x0, 0x1}, 0x20) 22:08:54 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) dup(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x0) 22:08:54 executing program 4: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) epoll_create(0xb) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 22:08:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000006400070500"/20, @ANYRES32, @ANYBLOB="0000ffff0000ffff000000000c000100677265640000000004000200"], 0x34}}, 0x0) 22:08:54 executing program 2: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 87.471647] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:54 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:54 executing program 5: delete_module(&(0x7f0000000000)='\x00', 0x0) [ 87.542517] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=100 sclass=netlink_route_socket pig=2924 comm=syz-executor.5 [ 87.544936] audit: type=1400 audit(1571090934.887:14): avc: denied { create } for pid=2914 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 87.676631] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:55 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r7 = fcntl$getown(r1, 0x9) fcntl$lock(r6, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r7}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='iPVS\x00') getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000044c0)={'ip6gre0\x00'}) 22:08:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe8a, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) 22:08:55 executing program 2: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self\b\x00\x00\x00r/current\x00', 0x2, 0x0) 22:08:55 executing program 1: bind$unix(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="ea000000"], 0x4) 22:08:55 executing program 5: r0 = socket(0x2, 0x1000000008002, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x10) write(r0, 0x0, 0x0) 22:08:55 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) 22:08:55 executing program 2: open$dir(0x0, 0x0, 0x0) 22:08:55 executing program 5: r0 = socket(0x18, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x1, &(0x7f00000000c0)={0x18, 0x2}, 0xc) 22:08:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000007140)=[{{&(0x7f0000001100)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x0) 22:08:55 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x49, &(0x7f0000000880)={@remote}, 0x20) 22:08:55 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r6 = fcntl$getown(r1, 0x9) fcntl$lock(r5, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r6}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='iPVS\x00') getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000180)) 22:08:55 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0x2, 0x0) connect$unix(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/1016], 0x10) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = dup(r0) sendto$inet6(r2, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) 22:08:55 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) utime(&(0x7f00000001c0)='./file0\x00', 0x0) 22:08:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000440)='cpuset.cpus\x00\xaa\xef+e\xcb\x98\xe6xm\xbe\xf2F\x96%\x12G\xc8X`\xed\xbe\xce\xdea', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x1000) 22:08:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket(0x40000000002, 0x3, 0x2) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs, 0x62) setsockopt$inet_int(r1, 0x0, 0x12, &(0x7f0000000000)=0xa4, 0x15a) recvmmsg(r1, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x400000000000412, 0x2, 0x0) 22:08:55 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:55 executing program 4: sync() r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/', 0x0, 0x0) getgid() getegid() socket$inet(0x2, 0x0, 0x0) setgroups(0x1, &(0x7f00000000c0)=[0x0]) 22:08:55 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 22:08:55 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8947, &(0x7f0000000140)='ip6tnl0\x00') 22:08:55 executing program 1: [ 88.483405] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! 22:08:55 executing program 1: 22:08:56 executing program 2: 22:08:56 executing program 5: 22:08:56 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:56 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) 22:08:56 executing program 4: r0 = socket(0x11, 0x10000000000003, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x3, &(0x7f0000000140)=ANY=[], 0x0) 22:08:56 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r6 = fcntl$getown(r1, 0x9) fcntl$lock(r5, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r6}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='iPVS\x00') 22:08:56 executing program 5: 22:08:56 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:56 executing program 2: 22:08:56 executing program 4: 22:08:56 executing program 5: 22:08:56 executing program 1: 22:08:56 executing program 2: 22:08:56 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:56 executing program 5: 22:08:56 executing program 4: 22:08:56 executing program 5: [ 89.224469] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:56 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r6 = fcntl$getown(r1, 0x9) fcntl$lock(r5, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r6}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) 22:08:56 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:56 executing program 1: 22:08:56 executing program 2: 22:08:56 executing program 4: 22:08:56 executing program 5: 22:08:57 executing program 1: 22:08:57 executing program 2: 22:08:57 executing program 5: 22:08:57 executing program 4: [ 89.636900] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:57 executing program 1: 22:08:57 executing program 2: 22:08:57 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r6 = fcntl$getown(r1, 0x9) fcntl$lock(r5, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r6}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) 22:08:57 executing program 4: 22:08:57 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:57 executing program 5: 22:08:57 executing program 2: 22:08:57 executing program 1: 22:08:57 executing program 1: 22:08:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x406, r1) 22:08:57 executing program 5: 22:08:57 executing program 4: [ 90.245319] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:57 executing program 1: 22:08:57 executing program 4: 22:08:58 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:58 executing program 5: 22:08:58 executing program 1: 22:08:58 executing program 2: 22:08:58 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r6 = fcntl$getown(r1, 0x9) fcntl$lock(r5, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r6}) 22:08:58 executing program 4: 22:08:58 executing program 1: 22:08:58 executing program 4: 22:08:58 executing program 2: 22:08:58 executing program 5: [ 90.836987] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:58 executing program 4: 22:08:58 executing program 2: 22:08:58 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:58 executing program 1: 22:08:58 executing program 5: 22:08:58 executing program 2: [ 91.018383] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:58 executing program 1: 22:08:58 executing program 4: 22:08:58 executing program 5: 22:08:58 executing program 2: 22:08:58 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:58 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) fcntl$getown(r1, 0x9) 22:08:58 executing program 4: 22:08:58 executing program 2: 22:08:58 executing program 5: 22:08:58 executing program 1: 22:08:58 executing program 2: 22:08:58 executing program 5: 22:08:58 executing program 4: [ 91.484856] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:08:58 executing program 1: 22:08:58 executing program 4: 22:08:58 executing program 2: 22:08:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:59 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) 22:08:59 executing program 5: 22:08:59 executing program 1: 22:08:59 executing program 4: 22:08:59 executing program 2: r0 = socket(0x2, 0x1, 0x0) shutdown(r0, 0x2) connect$inet(r0, &(0x7f0000000140)={0x2, 0x3}, 0xc) 22:08:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b70000000000000038000000001f00001f010000000000009500000000000000"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffdde}, 0x48) 22:08:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x30, 0x0, 0x0) 22:08:59 executing program 4: timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 22:08:59 executing program 2: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r6 = fcntl$getown(r1, 0x9) fcntl$lock(r5, 0x6, &(0x7f0000000400)={0x2, 0x2, 0x3, 0x8001, r6}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x4) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='iPVS\x00') 22:08:59 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:59 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xffffffff00000000) 22:08:59 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x800) write$binfmt_elf64(r0, &(0x7f0000004000)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0], 0x1a6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) ioctl$KDSETLED(r3, 0x4b32, 0x0) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$BLKROTATIONAL(r4, 0x127e, 0x0) syncfs(r4) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x80002, 0x0) connect$netlink(r6, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0xd) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@bridge_setlink={0x2c, 0x13, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@IFLA_AF_SPEC={0xc, 0x1a, [{0x4, 0x2}, {0x4, 0x1e}]}]}, 0x2c}}, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) dup2(r9, r8) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = socket$inet6(0xa, 0x2, 0x0) dup2(r11, r10) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="a4010000280000022bbd7000fedbdf2500000000", @ANYRES32=r7, @ANYBLOB="06000e0008000b0020ba00000800010061746d00e00002002c000300a9aeb6c8b6a36a8c68ae7adfff573ef39699cc5e31d344d0197bb6f7f659431d5a4a3a87bf66000008000100", @ANYRES32=r1, @ANYBLOB="080004000100f3ff08000100", @ANYRES32=r2, @ANYBLOB="38000300585cbd680eb63a9b752a4b90df7a01c6e6bf814a0477b3677f686b85783770d203da14f7e91dd4343c97ed81020000000000000008000100", @ANYRES32, @ANYBLOB="40000300c6f685aead9f5fd3eb6f6e70498de99887fb9108fb4fc6d646829259234590ffb07d8a7f5ffc3ad6c7aa80d28dc53a5a4856a417c432d2997022000008000400f2ff000008000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="08000500036000000c000100686673630000000074000200f00202000800000003000000ffffffff100001004ea10000210100000100010010000100ff030000000800000000000010000200000000000100000004000000100003000100000004000000070000001000030000000104018000000400000010000300ff07000003000000cd01000008000500070800000800050004060000"], 0x1a4}, 0x1, 0x0, 0x0, 0x20040800}, 0x4) r12 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$BLKROTATIONAL(r12, 0x127e, 0x0) syncfs(r12) sendmsg$IPVS_CMD_GET_DEST(r12, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2120840}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0xc76548b91674301d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000140), 0xa198) 22:08:59 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:59 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:08:59 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x1, 0x404) r4 = getpgrp(0x0) r5 = dup2(r2, r3) fcntl$setown(r5, 0x8, r4) fcntl$lock(r1, 0x7, &(0x7f0000027000)={0x2, 0x730270505204195e, 0x0, 0x0, r4}) r6 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RRENAMEAT(r0, &(0x7f0000000000)={0x7}, 0x7) truncate(&(0x7f0000000100)='./bus\x00', 0x0) 22:09:00 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:00 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:00 executing program 1: socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 92.743687] hrtimer: interrupt took 39980 ns 22:09:00 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:00 executing program 1: socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:00 executing program 2: pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r2, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) close(r2) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) write$binfmt_aout(r4, &(0x7f0000000180)=ANY=[], 0x0) fallocate(r4, 0x0, 0x0, 0x2000002) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) fallocate(r0, 0x0, 0x80000000000000, 0x110001) perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x20, 0x0, 0x31d, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x10001, 0x3f, 0x80000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x81, 0x5, 0x400000000000, 0x5, 0x0, 0x0, 0x0, 0x200, 0x9, 0x5, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300)}, 0x20000, 0x8001, 0x0, 0x8, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0x0, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r8, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) close(r8) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000040)={0x0, r4, 0x0, 0x2}) fallocate(0xffffffffffffffff, 0x2, 0x388f2924, 0x6) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) pipe(&(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r12, r11) dup2(r11, r10) ioctl$EVIOCGVERSION(r9, 0x80044501, &(0x7f0000000180)=""/51) syz_open_procfs(0x0, &(0x7f0000000280)='net/tcp6\x00') syz_genetlink_get_family_id$tipc2(0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0}) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000100)={{}, {r13}}, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 22:09:00 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 92.917614] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:09:00 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/member\x00', 0x2, 0x0) 22:09:00 executing program 1: socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:00 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x800) write$binfmt_elf64(r0, &(0x7f0000004000)=ANY=[@ANYRESHEX, @ANYRESOCT=0x0], 0x1a6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) ioctl$KDSETLED(r3, 0x4b32, 0x0) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$BLKROTATIONAL(r4, 0x127e, 0x0) syncfs(r4) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x80002, 0x0) connect$netlink(r6, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0xd) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@bridge_setlink={0x2c, 0x13, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r7}, [@IFLA_AF_SPEC={0xc, 0x1a, [{0x4, 0x2}, {0x4, 0x1e}]}]}, 0x2c}}, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) dup2(r9, r8) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = socket$inet6(0xa, 0x2, 0x0) dup2(r11, r10) sendmsg$nl_route_sched(r4, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="a4010000280000022bbd7000fedbdf2500000000", @ANYRES32=r7, @ANYBLOB="06000e0008000b0020ba00000800010061746d00e00002002c000300a9aeb6c8b6a36a8c68ae7adfff573ef39699cc5e31d344d0197bb6f7f659431d5a4a3a87bf66000008000100", @ANYRES32=r1, @ANYBLOB="080004000100f3ff08000100", @ANYRES32=r2, @ANYBLOB="38000300585cbd680eb63a9b752a4b90df7a01c6e6bf814a0477b3677f686b85783770d203da14f7e91dd4343c97ed81020000000000000008000100", @ANYRES32, @ANYBLOB="40000300c6f685aead9f5fd3eb6f6e70498de99887fb9108fb4fc6d646829259234590ffb07d8a7f5ffc3ad6c7aa80d28dc53a5a4856a417c432d2997022000008000400f2ff000008000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="08000500036000000c000100686673630000000074000200f00202000800000003000000ffffffff100001004ea10000210100000100010010000100ff030000000800000000000010000200000000000100000004000000100003000100000004000000070000001000030000000104018000000400000010000300ff07000003000000cd01000008000500070800000800050004060000"], 0x1a4}, 0x1, 0x0, 0x0, 0x20040800}, 0x4) r12 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$BLKROTATIONAL(r12, 0x127e, 0x0) syncfs(r12) sendmsg$IPVS_CMD_GET_DEST(r12, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2120840}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0xc76548b91674301d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000140), 0xa198) 22:09:00 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 93.274714] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:09:00 executing program 5: r0 = open(0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x83) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10920}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) pipe(&(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2810005}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r6, 0x200, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x7}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x11) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000003fc0)={0x0, 0x0, 0x0}, 0x0) sendfile(r1, r2, 0x0, 0x80003) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r3) 22:09:00 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000801, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) close(r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x12) 22:09:00 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:00 executing program 1: socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)="13", 0x1}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) creat(0x0, 0xfffffffffffffffe) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r6, 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r7, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 22:09:00 executing program 1: socket$inet6(0xa, 0x801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:00 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:00 executing program 1: socket$inet6(0xa, 0x801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 93.526224] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. [ 93.636051] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:09:01 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:01 executing program 1: socket$inet6(0xa, 0x801, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:01 executing program 3: socket$key(0xf, 0x3, 0x2) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56e, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) syz_extract_tcp_res(0x0, 0x9, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x10000, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) clone(0x20000000, &(0x7f0000000500)="f35e8fdd0dce633a241a37faec12072bb9085225665989cadec04819beca21ef419c8e90549a941d2c1cacf4f87b785c756fb973410347a0f0975ecc5caee8bbf1c9779987a02c27d4f6", 0x0, &(0x7f00000005c0), &(0x7f0000000600)="64411adeaac9c9295a423ce94b2d484c807c13431bd8293271f4124a5c19c90aba601fd546c905533b65a1b19b761404a1db00f1c65d67c108da8f5328fe9892ed81d61484387db401fa45f99ffc8306236611b27ca1b2f4bd234790a4bb93b740161fd377f891ef519519a4c6086fdcc7b3d1586bd0792e5f65961170085417d533e54d9549502cf412828c77bd86e61eae411dd7583e203cce01b271e86921d745c29fe7473c17d064430cb65269a27d159db5ce2285795b20fefba014a1821d82f9fa4a579b015dba3669bbf82718973031b82585565fcf0d72b5cfc88c6276def2c55d1ce188c13fd8ca5b90ebb2") statfs(&(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=""/20) 22:09:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)="13", 0x1}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) creat(0x0, 0xfffffffffffffffe) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20000102000007) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r6, 0x2) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r7, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 93.807437] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 22:09:01 executing program 5: r0 = open(0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x83) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10920}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) pipe(&(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r5, r4) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2810005}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r6, 0x200, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x7}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x11) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000003fc0)={0x0, 0x0, 0x0}, 0x0) sendfile(r1, r2, 0x0, 0x80003) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r3) 22:09:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r2 = socket$key(0xf, 0x3, 0x2) r3 = syz_open_pts(0xffffffffffffffff, 0x80) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) writev(r4, &(0x7f00000003c0), 0x63) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r3) dup3(r3, r2, 0x0) socket(0x10, 0x802, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) read(r5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x9, 0x7e}]}) syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$PIO_UNIMAP(r11, 0x4b67, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x9, 0x3}, {0x200, 0x3}, {0x2, 0xc08}, {0x1, 0x3}]}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r13, 0x2007fff) sendfile(r12, r13, 0x0, 0x800000000024) 22:09:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:01 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 93.901462] kasan: CONFIG_KASAN_INLINE enabled [ 93.906184] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 93.919224] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 93.926007] Modules linked in: [ 93.929195] CPU: 0 PID: 3393 Comm: syz-executor.4 Not tainted 4.14.149+ #0 [ 93.936201] task: 00000000c6f06407 task.stack: 00000000f21dfe03 [ 93.942256] RIP: 0010:kobject_uevent_env+0xa3/0xc60 [ 93.947261] RSP: 0018:ffff8881d4ccfc08 EFLAGS: 00010206 [ 93.952721] RAX: 0000000000000018 RBX: 0000000000000002 RCX: 1ffff110336c7104 [ 93.959990] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000000000c0 [ 93.968383] RBP: ffff8881d664aad0 R08: 0000000000000001 R09: 0000000000000003 [ 93.975827] R10: fffffbfff16c5ffd R11: ffffffff8b62ffeb R12: 00000000000000a0 [ 93.983094] R13: dffffc0000000000 R14: ffff8881d664a9c8 R15: 00000000000000a0 [ 93.990362] FS: 00000000025ef940(0000) GS:ffff8881db800000(0000) knlGS:0000000000000000 [ 93.998586] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 94.004463] CR2: 0000000000738000 CR3: 00000001c34b6001 CR4: 00000000001606b0 [ 94.011737] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 94.019006] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 94.026268] Call Trace: [ 94.028862] loop_clr_fd+0x4ab/0xad0 [ 94.032580] lo_release+0x10d/0x1a0 [ 94.036203] ? lo_open+0xb0/0xb0 [ 94.039574] __blkdev_put+0x518/0x6d0 [ 94.043374] ? bd_set_size+0xb0/0xb0 [ 94.047089] ? blkdev_put+0x75/0x4c0 [ 94.050800] ? blkdev_put+0x4c0/0x4c0 [ 94.054592] blkdev_close+0x86/0xb0 [ 94.058219] __fput+0x25e/0x710 [ 94.061497] task_work_run+0x125/0x1a0 [ 94.065393] exit_to_usermode_loop+0x13b/0x160 [ 94.069974] do_syscall_64+0x3a3/0x520 [ 94.073863] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 94.079057] RIP: 0033:0x413741 [ 94.082242] RSP: 002b:00007ffd278b80d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 94.089945] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413741 22:09:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:01 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 22:09:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x8a, &(0x7f0000000400)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8962b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5a, 0x2, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @sack={0x5, 0xa, [0x0, 0x0]}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 94.097212] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 94.104474] RBP: 0000000000000001 R08: ffffffff810c5928 R09: 00000000ff9eddb0 [ 94.111761] R10: 00007ffd278b81b0 R11: 0000000000000293 R12: 000000000075bf20 [ 94.119033] R13: 0000000000016ebc R14: 0000000000762128 R15: 000000000075bf2c [ 94.126303] Code: 03 42 80 3c 28 00 0f 85 44 0a 00 00 4d 8b 64 24 18 4d 85 e4 0f 84 22 02 00 00 e8 e9 0a ab fe 49 8d 7c 24 20 48 89 f8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 10 0a 00 00 49 8b 6c 24 20 48 85 ed 74 b0 [ 94.145462] RIP: kobject_uevent_env+0xa3/0xc60 RSP: ffff8881d4ccfc08 [ 94.153282] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. [ 94.159574] ---[ end trace 0be293e49f48b0a0 ]--- [ 94.168563] Kernel panic - not syncing: Fatal exception [ 94.174708] Kernel Offset: 0x7e00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 94.185652] Rebooting in 86400 seconds..