0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5100000000000000) 09:25:10 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xd9010000) 09:25:10 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:10 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) 09:25:10 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6500000000000000) 09:25:10 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xda000000) 09:25:10 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5101000000000000) 09:25:10 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xda010000) [ 876.637634] audit: type=1804 audit(1663925110.409:2423): pid=19775 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1414/bus" dev="sda1" ino=15905 res=1 [ 876.688069] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 876.689503] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:10 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6501000000000000) 09:25:10 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5200000000000000) [ 876.877982] audit: type=1804 audit(1663925110.409:2424): pid=19774 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1837/bus" dev="sda1" ino=14584 res=1 [ 877.137507] audit: type=1804 audit(1663925110.449:2425): pid=19767 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/329/bus" dev="sda1" ino=15857 res=1 [ 877.268335] audit: type=1804 audit(1663925110.599:2426): pid=19767 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/329/bus" dev="sda1" ino=15857 res=1 09:25:11 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:11 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:11 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xdb000000) 09:25:11 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5201000000000000) 09:25:11 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6600000000000000) 09:25:11 executing program 5: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2a000000) 09:25:11 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 877.948445] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:11 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xdb010000) 09:25:11 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6601000000000000) 09:25:11 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5300000000000000) 09:25:11 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xdc000000) [ 878.153197] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:12 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6700000000000000) 09:25:12 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:12 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:12 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:12 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xdc010000) 09:25:12 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5301000000000000) 09:25:12 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6701000000000000) 09:25:12 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6800000000000000) 09:25:12 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xdd000000) [ 879.142236] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:12 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5400000000000000) 09:25:13 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:13 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6801000000000000) [ 879.351990] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:13 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5401000000000000) [ 879.700801] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:13 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 880.185881] kauditd_printk_skb: 15 callbacks suppressed [ 880.185896] audit: type=1804 audit(1663925113.949:2442): pid=19908 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1840/bus" dev="sda1" ino=15825 res=1 09:25:14 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:14 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6900000000000000) 09:25:14 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xdd010000) 09:25:14 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5500000000000000) 09:25:14 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:14 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6901000000000000) 09:25:14 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:14 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5501000000000000) 09:25:14 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xde000000) [ 880.822784] audit: type=1804 audit(1663925114.589:2443): pid=19921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/334/bus" dev="sda1" ino=15538 res=1 [ 880.831252] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:14 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 880.901059] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:14 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5600000000000000) 09:25:14 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6a00000000000000) [ 880.979877] FAULT_INJECTION: forcing a failure. [ 880.979877] name failslab, interval 1, probability 0, space 0, times 0 [ 881.080007] audit: type=1804 audit(1663925114.599:2444): pid=19921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/334/bus" dev="sda1" ino=15538 res=1 [ 881.132898] CPU: 0 PID: 19927 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 [ 881.140809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 881.146126] audit: type=1804 audit(1663925114.649:2445): pid=19927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1417/bus" dev="sda1" ino=15746 res=1 [ 881.150158] Call Trace: [ 881.150179] dump_stack+0x1fc/0x2ef [ 881.150198] should_fail.cold+0xa/0xf [ 881.150220] ? setup_fault_attr+0x200/0x200 [ 881.150237] ? lock_acquire+0x170/0x3c0 [ 881.150256] __should_failslab+0x115/0x180 [ 881.150272] should_failslab+0x5/0x10 [ 881.150286] kmem_cache_alloc_trace+0x284/0x380 [ 881.150304] alloc_pipe_info+0xb8/0x470 [ 881.150324] splice_direct_to_actor+0x6dd/0x8d0 [ 881.185776] audit: type=1804 audit(1663925114.679:2446): pid=19921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/334/bus" dev="sda1" ino=15538 res=1 [ 881.188558] ? apparmor_getprocattr+0x11e0/0x11e0 [ 881.188576] ? generic_pipe_buf_nosteal+0x10/0x10 [ 881.188594] ? do_splice_to+0x160/0x160 [ 881.188608] ? security_file_permission+0x1c0/0x220 [ 881.188628] do_splice_direct+0x1a7/0x270 [ 881.188645] ? splice_direct_to_actor+0x8d0/0x8d0 [ 881.264858] ? security_file_permission+0x1c0/0x220 [ 881.269896] do_sendfile+0x550/0xc30 [ 881.273634] ? do_compat_pwritev64+0x1b0/0x1b0 [ 881.278237] ? vfs_write+0x393/0x540 [ 881.281958] __se_sys_sendfile64+0x147/0x160 [ 881.286371] ? __se_sys_sendfile+0x180/0x180 [ 881.290779] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 881.296166] ? trace_hardirqs_off_caller+0x6e/0x210 [ 881.301195] ? do_syscall_64+0x21/0x620 [ 881.305174] do_syscall_64+0xf9/0x620 [ 881.308979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.314173] RIP: 0033:0x7ff506e52669 [ 881.317885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 881.336780] RSP: 002b:00007ff5057a5168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 881.344484] RAX: ffffffffffffffda RBX: 00007ff506f74050 RCX: 00007ff506e52669 [ 881.351747] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 881.359012] RBP: 00007ff5057a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 881.366279] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 881.373542] R13: 00007fff9e63c16f R14: 00007ff5057a5300 R15: 0000000000022000 [ 881.402076] audit: type=1804 audit(1663925115.169:2447): pid=19938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1841/bus" dev="sda1" ino=16052 res=1 [ 881.469479] audit: type=1804 audit(1663925115.239:2448): pid=19943 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/335/bus" dev="sda1" ino=14337 res=1 [ 881.472521] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 881.607313] audit: type=1804 audit(1663925115.279:2449): pid=19936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1417/bus" dev="sda1" ino=15746 res=1 09:25:15 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:15 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5601000000000000) 09:25:15 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6a01000000000000) 09:25:15 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xde010000) [ 881.859304] audit: type=1804 audit(1663925115.489:2450): pid=19950 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/335/bus" dev="sda1" ino=14337 res=1 09:25:15 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:15 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xdf000000) [ 882.037472] audit: type=1804 audit(1663925115.779:2451): pid=19949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1841/bus" dev="sda1" ino=16052 res=1 09:25:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDENABIO(r0, 0x4b36) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x80000001, 0x9, 0xbcc7, 0x0, 0x5, "c2d857c9a5e4a25d37ef0e3a7b08a02303bb01"}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x6000) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x6, 0x1000, 0x269, 0x0, 0x8, "78c1600acccf1b56"}) 09:25:15 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6b00000000000000) 09:25:15 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5700000000000000) 09:25:16 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xdf010000) [ 882.212221] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 882.244132] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:16 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5701000000000000) 09:25:16 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6b01000000000000) 09:25:16 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5800000000000000) 09:25:16 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe0000000) 09:25:16 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6c00000000000000) 09:25:16 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDENABIO(r0, 0x4b36) (async) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x80000001, 0x9, 0xbcc7, 0x0, 0x5, "c2d857c9a5e4a25d37ef0e3a7b08a02303bb01"}) (async) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x6000) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x6, 0x1000, 0x269, 0x0, 0x8, "78c1600acccf1b56"}) 09:25:16 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020045) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:16 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe0010000) 09:25:16 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5801000000000000) 09:25:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDENABIO(r0, 0x4b36) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x80000001, 0x9, 0xbcc7, 0x0, 0x5, "c2d857c9a5e4a25d37ef0e3a7b08a02303bb01"}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x6000) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x6, 0x1000, 0x269, 0x0, 0x8, "78c1600acccf1b56"}) syz_open_dev$tty1(0xc, 0x4, 0x1) (async) ioctl$KDENABIO(r0, 0x4b36) (async) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000080)={0x80000001, 0x9, 0xbcc7, 0x0, 0x5, "c2d857c9a5e4a25d37ef0e3a7b08a02303bb01"}) (async) openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x6000) (async) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000040)={0x6, 0x1000, 0x269, 0x0, 0x8, "78c1600acccf1b56"}) (async) 09:25:16 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6c01000000000000) 09:25:16 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe1000000) [ 883.095276] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:16 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5900000000000000) [ 883.154602] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:17 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe1010000) 09:25:17 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6d00000000000000) 09:25:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x110, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000003c0)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xfb, "9afc2dcf3a4ebd"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000064e80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x8, "388ba501dc8d52"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b740)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "4603beae130363"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d5c0)={0x7, [], 0x0, "4dedac18a29c84"}) ioctl$USBDEVFS_IOCTL(r1, 0x8108551b, &(0x7f0000000380)) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="04"]) r7 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$USBDEVFS_IOCTL(r7, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) syz_open_procfs(0x0, 0x0) [ 883.685336] hub 9-0:1.0: USB hub found [ 883.702841] hub 9-0:1.0: 8 ports detected 09:25:17 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:17 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe2000000) 09:25:17 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6d01000000000000) 09:25:17 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5901000000000000) 09:25:17 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020047) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) (async) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x110, 0xffffffffffffffff, 0x0) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000003c0)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xfb, "9afc2dcf3a4ebd"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000064e80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x8, "388ba501dc8d52"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b740)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "4603beae130363"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d5c0)={0x7, [], 0x0, "4dedac18a29c84"}) (async) ioctl$USBDEVFS_IOCTL(r1, 0x8108551b, &(0x7f0000000380)) (async) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="04"]) (async) r7 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) (async) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) (async) ioctl$USBDEVFS_IOCTL(r7, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) (async) syz_open_procfs(0x0, 0x0) 09:25:17 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5a00000000000000) 09:25:17 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe2010000) 09:25:17 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6e00000000000000) [ 884.051208] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.4' sets config #0 09:25:17 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5a01000000000000) 09:25:17 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 884.137199] usb usb9: usbfs: interface 0 claimed by usbfs while 'syz-executor.4' sets config #1 09:25:17 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6e01000000000000) 09:25:18 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe3000000) 09:25:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) (rerun: 64) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6, 0x110, 0xffffffffffffffff, 0x0) (async) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000003c0)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0xfb, "9afc2dcf3a4ebd"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000064e80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x8, "388ba501dc8d52"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b740)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0x0, "4603beae130363"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d5c0)={0x7, [], 0x0, "4dedac18a29c84"}) ioctl$USBDEVFS_IOCTL(r1, 0x8108551b, &(0x7f0000000380)) (async) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="04"]) r7 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) (async) ioctl$USBDEVFS_IOCTL(r7, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) (async) syz_open_procfs(0x0, 0x0) 09:25:18 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5b00000000000000) [ 884.399974] hub 9-0:1.0: USB hub found [ 884.444905] hub 9-0:1.0: 8 ports detected 09:25:18 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6f00000000000000) [ 884.485112] net_ratelimit: 2 callbacks suppressed [ 884.485121] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:18 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100022007) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:18 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe3010000) 09:25:18 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(0xffffffffffffffff, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:18 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5b01000000000000) 09:25:18 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe4000000) 09:25:18 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6f01000000000000) 09:25:18 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5c00000000000000) 09:25:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x100, @dev={0xfe, 0x80, '\x00', 0x41}}, {0xa, 0x4e20, 0x6, @empty, 0x8}, r1, 0x101}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000600)={0x14, 0x88, 0xfa00, {r6, 0x10, 0x0, @in={0x2, 0x0, @broadcast}}}, 0x90) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000400), r6}}, 0x18) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x9, 0x1, 0x36, 0x3, 0x0, 0x9, 0x3, 0x5, 0x1, 0x29, 0x1, 0x1f, 0xea, 0x1f}, 0xe) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000091a000/0x4000)=nil) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000180)}}, 0x10) [ 884.752048] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:18 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7000000000000000) 09:25:18 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe4010000) 09:25:18 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:18 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5c01000000000000) [ 884.885783] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 885.201289] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 885.334499] kauditd_printk_skb: 19 callbacks suppressed [ 885.334514] audit: type=1804 audit(1663925119.099:2471): pid=20167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/341/bus" dev="sda1" ino=14031 res=1 09:25:19 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7001000000000000) 09:25:19 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe5000000) 09:25:19 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5d00000000000000) 09:25:19 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:19 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2005fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x40) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x100, @dev={0xfe, 0x80, '\x00', 0x41}}, {0xa, 0x4e20, 0x6, @empty, 0x8}, r1, 0x101}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) (async) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) (async) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) (async) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000600)={0x14, 0x88, 0xfa00, {r6, 0x10, 0x0, @in={0x2, 0x0, @broadcast}}}, 0x90) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000400), r6}}, 0x18) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x9, 0x1, 0x36, 0x3, 0x0, 0x9, 0x3, 0x5, 0x1, 0x29, 0x1, 0x1f, 0xea, 0x1f}, 0xe) (async) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000091a000/0x4000)=nil) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000180)}}, 0x10) 09:25:19 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe5010000) 09:25:19 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7100000000000000) 09:25:19 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5d01000000000000) [ 885.591741] audit: type=1804 audit(1663925119.359:2472): pid=20189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/342/bus" dev="sda1" ino=16038 res=1 [ 885.622235] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 885.652206] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:19 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe6000000) 09:25:19 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x0) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:19 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5e00000000000000) 09:25:19 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7101000000000000) [ 885.817084] audit: type=1804 audit(1663925119.399:2473): pid=20198 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1422/bus" dev="sda1" ino=15749 res=1 09:25:19 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe6010000) 09:25:19 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7200000000000000) [ 886.035464] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:19 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5e01000000000000) [ 886.096904] audit: type=1804 audit(1663925119.449:2474): pid=20189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/342/bus" dev="sda1" ino=16038 res=1 09:25:19 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2005fff) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x40) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 32) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async, rerun: 32) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async, rerun: 64) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 886.183255] audit: type=1804 audit(1663925119.669:2475): pid=20208 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1422/bus" dev="sda1" ino=15749 res=1 [ 886.230108] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 886.338716] audit: type=1804 audit(1663925119.799:2476): pid=20222 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/343/bus" dev="sda1" ino=14343 res=1 09:25:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x100, @dev={0xfe, 0x80, '\x00', 0x41}}, {0xa, 0x4e20, 0x6, @empty, 0x8}, r1, 0x101}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) (async) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000600)={0x14, 0x88, 0xfa00, {r6, 0x10, 0x0, @in={0x2, 0x0, @broadcast}}}, 0x90) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000400), r6}}, 0x18) (async) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x9, 0x1, 0x36, 0x3, 0x0, 0x9, 0x3, 0x5, 0x1, 0x29, 0x1, 0x1f, 0xea, 0x1f}, 0xe) (async, rerun: 64) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000091a000/0x4000)=nil) (async, rerun: 64) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) (rerun: 32) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000180)}}, 0x10) 09:25:20 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe7000000) 09:25:20 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:20 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7201000000000000) 09:25:20 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5f00000000000000) [ 886.661602] audit: type=1804 audit(1663925119.949:2477): pid=20222 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/343/bus" dev="sda1" ino=14343 res=1 09:25:20 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x5f01000000000000) 09:25:20 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe7010000) [ 886.827510] audit: type=1804 audit(1663925119.989:2478): pid=20233 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1423/bus" dev="sda1" ino=15753 res=1 [ 886.852518] audit: type=1804 audit(1663925120.069:2479): pid=20237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1423/bus" dev="sda1" ino=15753 res=1 09:25:20 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7300000000000000) [ 886.953342] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:20 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:20 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7301000000000000) [ 887.114807] audit: type=1804 audit(1663925120.569:2480): pid=20266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/344/bus" dev="sda1" ino=16091 res=1 09:25:20 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6000000000000000) 09:25:20 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2005fff) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x40) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async, rerun: 64) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async, rerun: 64) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 887.307948] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x100, @dev={0xfe, 0x80, '\x00', 0x41}}, {0xa, 0x4e20, 0x6, @empty, 0x8}, r1, 0x101}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000600)={0x14, 0x88, 0xfa00, {r6, 0x10, 0x0, @in={0x2, 0x0, @broadcast}}}, 0x90) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000440)={0x1, 0x10, 0xfa00, {&(0x7f0000000400), r6}}, 0x18) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x9, 0x1, 0x36, 0x3, 0x0, 0x9, 0x3, 0x5, 0x1, 0x29, 0x1, 0x1f, 0xea, 0x1f}, 0xe) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000091a000/0x4000)=nil) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000180)}}, 0x10) 09:25:21 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe8000000) 09:25:21 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7400000000000000) 09:25:21 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6001000000000000) 09:25:21 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x14}, 0x2000, 0x0, 0x0, 0x4, 0x48ec, 0x0, 0x0, 0x0, 0x2}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xb) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @private2, 0x1010}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x102) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x3000800, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:21 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe8010000) 09:25:21 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6100000000000000) 09:25:21 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7401000000000000) 09:25:21 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:21 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe9000000) 09:25:21 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x14}, 0x2000, 0x0, 0x0, 0x4, 0x48ec, 0x0, 0x0, 0x0, 0x2}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xb) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @private2, 0x1010}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x102) (async, rerun: 32) sendfile(r5, r3, 0x0, 0x800100020046) (async, rerun: 32) syz_clone(0x3000800, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:21 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6101000000000000) 09:25:21 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7500000000000000) 09:25:21 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x100) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000000)={0x2, 0x2}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000004b, 0x142, 0x0) 09:25:21 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe9010000) 09:25:21 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6200000000000000) 09:25:22 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7501000000000000) 09:25:22 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x14}, 0x2000, 0x0, 0x0, 0x4, 0x48ec, 0x0, 0x0, 0x0, 0x2}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xb) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async, rerun: 32) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async, rerun: 32) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @private2, 0x1010}, 0x1c) listen(r4, 0x0) (async, rerun: 32) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 32) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async, rerun: 64) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (rerun: 64) faccessat(0xffffffffffffffff, 0x0, 0x102) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x3000800, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:22 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x100) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) (async) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000000)={0x2, 0x2}) (async) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000004b, 0x142, 0x0) 09:25:22 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6201000000000000) 09:25:22 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:22 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xea000000) 09:25:22 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7600000000000000) 09:25:22 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000084, &(0x7f0000000140)={0xa, 0x100000004e22, 0x10, @loopback, 0x401}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:22 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6300000000000000) 09:25:22 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x100) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000003, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000000)={0x2, 0x2}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) (async) recvmmsg(r0, &(0x7f00000064c0), 0x40000000000004b, 0x142, 0x0) 09:25:22 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7601000000000000) 09:25:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="402afbd2d7a8966c9a41e98e76c32080682a5dc806fbebb98846415841630dce37967026e1f4ca7a6e17d7012491b4e7edf61c84b64d8b9f48f8a5fea59a9245a4165765fae53f7cd11c22e03eddc0dc42a4de87ab1b64c2ac82", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fedbdf250f000000"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) r2 = syz_open_dev$vim2m(&(0x7f0000000040), 0x7, 0x2) r3 = signalfd4(r1, &(0x7f0000000140)={[0x7fffffffffffffff]}, 0x8, 0x800) r4 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) sendfile(r3, r4, &(0x7f00000007c0)=0x7, 0x9) ioctl$vim2m_VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000240)={0x1, @pix_mp={0x0, 0x0, 0x34565559, 0x0, 0x0, [], 0x0, 0x0, 0x1}}) 09:25:23 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xea010000) 09:25:23 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6301000000000000) 09:25:23 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7700000000000000) 09:25:23 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000084, &(0x7f0000000140)={0xa, 0x100000004e22, 0x10, @loopback, 0x401}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000084, &(0x7f0000000140)={0xa, 0x100000004e22, 0x10, @loopback, 0x401}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) [ 889.358014] xt_CT: You must specify a L4 protocol and not use inversions on it 09:25:23 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) (async) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="402afbd2d7a8966c9a41e98e76c32080682a5dc806fbebb98846415841630dce37967026e1f4ca7a6e17d7012491b4e7edf61c84b64d8b9f48f8a5fea59a9245a4165765fae53f7cd11c22e03eddc0dc42a4de87ab1b64c2ac82", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fedbdf250f000000"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) r2 = syz_open_dev$vim2m(&(0x7f0000000040), 0x7, 0x2) (async) r3 = signalfd4(r1, &(0x7f0000000140)={[0x7fffffffffffffff]}, 0x8, 0x800) (async) r4 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) sendfile(r3, r4, &(0x7f00000007c0)=0x7, 0x9) (async) ioctl$vim2m_VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000240)={0x1, @pix_mp={0x0, 0x0, 0x34565559, 0x0, 0x0, [], 0x0, 0x0, 0x1}}) 09:25:23 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7701000000000000) 09:25:23 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xeb000000) 09:25:23 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6400000000000000) 09:25:23 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async, rerun: 64) r1 = getpgid(0x0) (rerun: 64) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async, rerun: 64) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async, rerun: 64) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000084, &(0x7f0000000140)={0xa, 0x100000004e22, 0x10, @loopback, 0x401}, 0x1c) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 32) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (rerun: 32) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:23 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7800000000000000) 09:25:24 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6401000000000000) 09:25:24 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xeb010000) [ 890.187494] xt_CT: You must specify a L4 protocol and not use inversions on it 09:25:24 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x143) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) (async) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="402afbd2d7a8966c9a41e98e76c32080682a5dc806fbebb98846415841630dce37967026e1f4ca7a6e17d7012491b4e7edf61c84b64d8b9f48f8a5fea59a9245a4165765fae53f7cd11c22e03eddc0dc42a4de87ab1b64c2ac82", @ANYRES16=0x0, @ANYBLOB="00012cbd7000fedbdf250f000000"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x24000000) r2 = syz_open_dev$vim2m(&(0x7f0000000040), 0x7, 0x2) (async) r3 = signalfd4(r1, &(0x7f0000000140)={[0x7fffffffffffffff]}, 0x8, 0x800) (async) r4 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) sendfile(r3, r4, &(0x7f00000007c0)=0x7, 0x9) (async) ioctl$vim2m_VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000240)={0x1, @pix_mp={0x0, 0x0, 0x34565559, 0x0, 0x0, [], 0x0, 0x0, 0x1}}) [ 890.253293] net_ratelimit: 2 callbacks suppressed [ 890.253303] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:24 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7801000000000000) [ 890.353972] xt_CT: You must specify a L4 protocol and not use inversions on it [ 890.410207] kauditd_printk_skb: 16 callbacks suppressed [ 890.410227] audit: type=1804 audit(1663925124.180:2497): pid=20484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1431/bus" dev="sda1" ino=14031 res=1 [ 890.446975] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 890.507208] audit: type=1804 audit(1663925124.260:2498): pid=20484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1431/file0" dev="sda1" ino=14342 res=1 [ 890.604647] audit: type=1804 audit(1663925124.300:2499): pid=20484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1431/bus" dev="sda1" ino=14031 res=1 [ 890.635774] audit: type=1804 audit(1663925124.340:2500): pid=20485 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/348/bus" dev="sda1" ino=14344 res=1 09:25:24 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:24 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xec000000) 09:25:24 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6500000000000000) 09:25:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) ftruncate(r3, 0x7fffffff) sendfile(0xffffffffffffffff, r3, 0x0, 0x800000a1) lseek(r3, 0x0, 0x4) 09:25:24 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x143) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:24 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7900000000000000) 09:25:24 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xec010000) [ 891.114308] audit: type=1804 audit(1663925124.880:2501): pid=20510 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/349/bus" dev="sda1" ino=15746 res=1 [ 891.118720] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:25 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7901000000000000) 09:25:25 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6501000000000000) [ 891.295228] audit: type=1804 audit(1663925125.060:2502): pid=20515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1432/bus" dev="sda1" ino=16126 res=1 [ 891.296704] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:25 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xed000000) 09:25:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r2, 0x208200) (async) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) (async) ftruncate(r3, 0x7fffffff) (async) sendfile(0xffffffffffffffff, r3, 0x0, 0x800000a1) (async) lseek(r3, 0x0, 0x4) [ 891.393651] audit: type=1804 audit(1663925125.110:2503): pid=20523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1432/file0" dev="sda1" ino=16089 res=1 09:25:25 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6600000000000000) [ 891.657481] audit: type=1804 audit(1663925125.160:2504): pid=20515 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1432/bus" dev="sda1" ino=16126 res=1 [ 891.683754] audit: type=1804 audit(1663925125.190:2505): pid=20514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/349/bus" dev="sda1" ino=15746 res=1 09:25:25 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:25 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000200)='./file0\x00', 0x141042, 0x143) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:25 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xed010000) 09:25:25 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7a00000000000000) 09:25:25 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6601000000000000) 09:25:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) (async, rerun: 32) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async, rerun: 32) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000100)='0', 0x1}], 0x1) (async) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r2, 0x208200) (async) r3 = socket$inet6(0xa, 0x401000000001, 0x0) close(r3) (async) ftruncate(r3, 0x7fffffff) (async) sendfile(0xffffffffffffffff, r3, 0x0, 0x800000a1) lseek(r3, 0x0, 0x4) 09:25:25 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xee000000) 09:25:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRES16=r2], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYBLOB="c2dee139f1dffdb1b6f8c9dc522fb35e99b4bbddbb1499183f11bfcb00d6880000222b8acf85a903781e198d0d7b325e8c6ebc41adf8f656f5c87177dbea78d254a571980fa8b6e6974f7136d4b253e03416b0b818f023c1c300000000000000000000007f1695a83f9acb5aa3e9615b2e443ee018b807814b84335010c4b304edd27b1f4a6fc428aa55f43ba8e593cbf98ad558c05083918ce8140999a376e6a7712181d0f866a09003ff98c934201864ae233b1e77e3f6bf625595f80d549ad038cb2359b00edc6678bed67de9786403da950416f96bceed69e065b8", @ANYRES16, @ANYRES64], 0xfffffecc) ftruncate(0xffffffffffffffff, 0x1000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000800)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x0, '\x00', 0x7}, {}, {}, {}, {}, {}, {0x0, 0x6}, {0xfd}, {0x0, 0x5, 0x0, '\x00', 0x80}, {}, {}, {0x0, 0x0, 0x0, '\x00', 0x1f}]}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 892.068727] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 892.082116] audit: type=1804 audit(1663925125.860:2506): pid=20570 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1433/bus" dev="sda1" ino=16123 res=1 09:25:25 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6700000000000000) 09:25:25 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 892.116342] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:25 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7a01000000000000) 09:25:26 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6701000000000000) [ 892.449667] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:26 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:26 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xee010000) 09:25:26 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7b00000000000000) 09:25:26 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6800000000000000) 09:25:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRES16=r2], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYBLOB="c2dee139f1dffdb1b6f8c9dc522fb35e99b4bbddbb1499183f11bfcb00d6880000222b8acf85a903781e198d0d7b325e8c6ebc41adf8f656f5c87177dbea78d254a571980fa8b6e6974f7136d4b253e03416b0b818f023c1c300000000000000000000007f1695a83f9acb5aa3e9615b2e443ee018b807814b84335010c4b304edd27b1f4a6fc428aa55f43ba8e593cbf98ad558c05083918ce8140999a376e6a7712181d0f866a09003ff98c934201864ae233b1e77e3f6bf625595f80d549ad038cb2359b00edc6678bed67de9786403da950416f96bceed69e065b8", @ANYRES16, @ANYRES64], 0xfffffecc) ftruncate(0xffffffffffffffff, 0x1000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000800)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x0, '\x00', 0x7}, {}, {}, {}, {}, {}, {0x0, 0x6}, {0xfd}, {0x0, 0x5, 0x0, '\x00', 0x80}, {}, {}, {0x0, 0x0, 0x0, '\x00', 0x1f}]}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) (async) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRES16=r2], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) (async) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) (async) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) (async) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) (async) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) (async) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYBLOB="c2dee139f1dffdb1b6f8c9dc522fb35e99b4bbddbb1499183f11bfcb00d6880000222b8acf85a903781e198d0d7b325e8c6ebc41adf8f656f5c87177dbea78d254a571980fa8b6e6974f7136d4b253e03416b0b818f023c1c300000000000000000000007f1695a83f9acb5aa3e9615b2e443ee018b807814b84335010c4b304edd27b1f4a6fc428aa55f43ba8e593cbf98ad558c05083918ce8140999a376e6a7712181d0f866a09003ff98c934201864ae233b1e77e3f6bf625595f80d549ad038cb2359b00edc6678bed67de9786403da950416f96bceed69e065b8", @ANYRES16, @ANYRES64], 0xfffffecc) (async) ftruncate(0xffffffffffffffff, 0x1000) (async) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000800)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x0, '\x00', 0x7}, {}, {}, {}, {}, {}, {0x0, 0x6}, {0xfd}, {0x0, 0x5, 0x0, '\x00', 0x80}, {}, {}, {0x0, 0x0, 0x0, '\x00', 0x1f}]}}) (async) ioctl$KVM_RUN(r3, 0xae80, 0x0) (async) 09:25:26 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7b01000000000000) 09:25:26 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6801000000000000) 09:25:26 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:26 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xef000000) [ 892.690759] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:26 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6900000000000000) 09:25:26 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7c00000000000000) 09:25:26 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xef010000) [ 892.851308] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:26 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6901000000000000) 09:25:26 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:26 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7c01000000000000) 09:25:26 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf0000000) 09:25:26 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x0) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRES16=r2], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) (async) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) (async) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) (async) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) (async) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYBLOB="c2dee139f1dffdb1b6f8c9dc522fb35e99b4bbddbb1499183f11bfcb00d6880000222b8acf85a903781e198d0d7b325e8c6ebc41adf8f656f5c87177dbea78d254a571980fa8b6e6974f7136d4b253e03416b0b818f023c1c300000000000000000000007f1695a83f9acb5aa3e9615b2e443ee018b807814b84335010c4b304edd27b1f4a6fc428aa55f43ba8e593cbf98ad558c05083918ce8140999a376e6a7712181d0f866a09003ff98c934201864ae233b1e77e3f6bf625595f80d549ad038cb2359b00edc6678bed67de9786403da950416f96bceed69e065b8", @ANYRES16, @ANYRES64], 0xfffffecc) (async) ftruncate(0xffffffffffffffff, 0x1000) (async) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000800)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x0, 0x0, '\x00', 0x7}, {}, {}, {}, {}, {}, {0x0, 0x6}, {0xfd}, {0x0, 0x5, 0x0, '\x00', 0x80}, {}, {}, {0x0, 0x0, 0x0, '\x00', 0x1f}]}}) (async) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:25:26 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf0010000) 09:25:27 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6a00000000000000) 09:25:27 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7d00000000000000) 09:25:27 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf1000000) [ 893.274499] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:27 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6a01000000000000) 09:25:27 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7d01000000000000) 09:25:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f00000000c0)={0xffffffe0, 0x2, 0x2}) ioctl$vim2m_VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000880)=@multiplanar_userptr={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '#\x00@\x00'}, 0xfffffffe, 0x2, {&(0x7f0000000000)=[{0x0, 0x0, {0x0}}, {0x0, 0x0, {0x0}}]}, 0x96000}) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r3, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000f80)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x1, 0x40, 0xff, 0x0, 0x0, 0x1, 0x400, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000740), 0x9}, 0x41082, 0xeb2, 0x80000001, 0x0, 0x2, 0xffffffff, 0x7, 0x0, 0x7fffffff, 0x0, 0x9}, 0x0, 0x7, r0, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xd5, 0xd9, &(0x7f0000000000)="1198e5fe21ec91c6f859130c8d98d423dde576da26155b63160621455b20491461b9b30aea741fc0f826d10143fedfe6c9c77008667b7dd9a22f5c9ebd00f00958248e200c6d41d337352e36697381994373d279f5c77e4bf237823a49e1ac2856ce2c3c2fe60cd1fd0496c64b5c2e6d1c2751cb47ffb51d988f6696a213559bd57b278f4197fde1d3efb585a2c7207ca4f7111bd2916d2089ef42a5d115fbf176f2d41fb52ea5a941081c52020c59aadd66b3b38f04c65aa039a5df8bb4d0d93e3c71efefc71267fcc5628a2c2601d60699655d7e", &(0x7f0000000200)=""/217, 0xee, 0x0, 0xdd, 0xd7, &(0x7f0000000300)="5694802af5dcc47652f701323800884ff0405f7a0cef4a9ffd8b51ffa5fff09c19c629b16c8594f9125bd24ee6a646ea9a6b7194f3f758b8ced11f50dd7e6b98bcf1c3f7b3912152d40b884ba04e5ececf955137a6df37fa8f5a21f70625e8adfe5adcbc3c1f3a21f9add62649202c637934534641d3958e00460b2a66445c637b52ca709d21a607d4ed81bbb9c1a69e027ff9ca5c624b140a13702ac196c5a0f0ac707cfe8c3b43e1f8384cd7b10f85b61d2f92d00807c6c75b009bb6545c77981dbf99e405d872ebd5425ee62183f2a122aa36381843b7cb1bbf3419", &(0x7f00000004c0)="892a44d8ad2694637ba1f5916138b035fdcdf7de2667f360d5a7ab2b83fcd9f9ef52ddc184543502e2a6073c38947ab786d334ca9481883135c10801e1fe7491697bde3c9b85532f6affaa76c937be348b91ef073f1104cedf70e6722e52cb98a2df082f120094b80546350c3874cae233ab5dce68a038d97b593e738bb6a8e7d6113acbc86dfc95525627d1d387211dcda81fba083c53c0d494f748521e32c54977553fd808cceea10cd3a4fe892241d95679dfcb0137ad291a48a104ce225f520c6a6ee91d5b72e60c566e09a85f8d10f913ebf9d82e", 0x1, 0x9}, 0x48) getpid() r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000b40)=@filter={'filter\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x0, 0x1f8, 0x0, 0xffffffff, 0xffffffff, 0x2f8, 0x2f8, 0x2f8, 0xffffffff, 0x4, &(0x7f0000000700), {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@eui64={{0x28}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x2, 0x4}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@inet=@dccp={{0x30}, {[0x4e20, 0x4e20], [0x4e23, 0x4e20], 0x5, 0x4, 0x100, 0x6}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x5, 0x9, 0x2}}}, {{@ipv6={@mcast2, @private0, [0xffffff00, 0xffffffff, 0x0, 0xff000000], [0x0, 0x0, 0xff000000, 0xff], 'veth0_vlan\x00', '\x00', {}, {}, 0x2f, 0x3, 0x3}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x4, 0x0, 0x3}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:25:27 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0xffffffeffffffffe, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(r0, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:27 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6b00000000000000) 09:25:27 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7e00000000000000) [ 893.550813] xt_CT: You must specify a L4 protocol and not use inversions on it [ 893.601874] xt_CT: You must specify a L4 protocol and not use inversions on it [ 893.644111] x_tables: duplicate underflow at hook 2 09:25:27 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:27 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf1010000) 09:25:27 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7e01000000000000) 09:25:27 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6b01000000000000) 09:25:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f00000000c0)={0xffffffe0, 0x2, 0x2}) (async) ioctl$vim2m_VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000880)=@multiplanar_userptr={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '#\x00@\x00'}, 0xfffffffe, 0x2, {&(0x7f0000000000)=[{0x0, 0x0, {0x0}}, {0x0, 0x0, {0x0}}]}, 0x96000}) (async) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r3, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000f80)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) (async) perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x1, 0x40, 0xff, 0x0, 0x0, 0x1, 0x400, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000740), 0x9}, 0x41082, 0xeb2, 0x80000001, 0x0, 0x2, 0xffffffff, 0x7, 0x0, 0x7fffffff, 0x0, 0x9}, 0x0, 0x7, r0, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xd5, 0xd9, &(0x7f0000000000)="1198e5fe21ec91c6f859130c8d98d423dde576da26155b63160621455b20491461b9b30aea741fc0f826d10143fedfe6c9c77008667b7dd9a22f5c9ebd00f00958248e200c6d41d337352e36697381994373d279f5c77e4bf237823a49e1ac2856ce2c3c2fe60cd1fd0496c64b5c2e6d1c2751cb47ffb51d988f6696a213559bd57b278f4197fde1d3efb585a2c7207ca4f7111bd2916d2089ef42a5d115fbf176f2d41fb52ea5a941081c52020c59aadd66b3b38f04c65aa039a5df8bb4d0d93e3c71efefc71267fcc5628a2c2601d60699655d7e", &(0x7f0000000200)=""/217, 0xee, 0x0, 0xdd, 0xd7, &(0x7f0000000300)="5694802af5dcc47652f701323800884ff0405f7a0cef4a9ffd8b51ffa5fff09c19c629b16c8594f9125bd24ee6a646ea9a6b7194f3f758b8ced11f50dd7e6b98bcf1c3f7b3912152d40b884ba04e5ececf955137a6df37fa8f5a21f70625e8adfe5adcbc3c1f3a21f9add62649202c637934534641d3958e00460b2a66445c637b52ca709d21a607d4ed81bbb9c1a69e027ff9ca5c624b140a13702ac196c5a0f0ac707cfe8c3b43e1f8384cd7b10f85b61d2f92d00807c6c75b009bb6545c77981dbf99e405d872ebd5425ee62183f2a122aa36381843b7cb1bbf3419", &(0x7f00000004c0)="892a44d8ad2694637ba1f5916138b035fdcdf7de2667f360d5a7ab2b83fcd9f9ef52ddc184543502e2a6073c38947ab786d334ca9481883135c10801e1fe7491697bde3c9b85532f6affaa76c937be348b91ef073f1104cedf70e6722e52cb98a2df082f120094b80546350c3874cae233ab5dce68a038d97b593e738bb6a8e7d6113acbc86dfc95525627d1d387211dcda81fba083c53c0d494f748521e32c54977553fd808cceea10cd3a4fe892241d95679dfcb0137ad291a48a104ce225f520c6a6ee91d5b72e60c566e09a85f8d10f913ebf9d82e", 0x1, 0x9}, 0x48) getpid() (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000b40)=@filter={'filter\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x0, 0x1f8, 0x0, 0xffffffff, 0xffffffff, 0x2f8, 0x2f8, 0x2f8, 0xffffffff, 0x4, &(0x7f0000000700), {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@eui64={{0x28}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x2, 0x4}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@inet=@dccp={{0x30}, {[0x4e20, 0x4e20], [0x4e23, 0x4e20], 0x5, 0x4, 0x100, 0x6}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x5, 0x9, 0x2}}}, {{@ipv6={@mcast2, @private0, [0xffffff00, 0xffffffff, 0x0, 0xff000000], [0x0, 0x0, 0xff000000, 0xff], 'veth0_vlan\x00', '\x00', {}, {}, 0x2f, 0x3, 0x3}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x4, 0x0, 0x3}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:25:27 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7f00000000000000) 09:25:27 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6c00000000000000) 09:25:27 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf2000000) [ 893.936759] xt_CT: You must specify a L4 protocol and not use inversions on it [ 893.947490] x_tables: duplicate underflow at hook 2 09:25:27 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0xffffffeffffffffe, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(r0, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:27 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7f01000000000000) 09:25:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r0 = perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f00000000c0)={0xffffffe0, 0x2, 0x2}) (async) ioctl$vim2m_VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000880)=@multiplanar_userptr={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '#\x00@\x00'}, 0xfffffffe, 0x2, {&(0x7f0000000000)=[{0x0, 0x0, {0x0}}, {0x0, 0x0, {0x0}}]}, 0x96000}) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) (async) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) accept4(r1, 0x0, 0x0, 0x0) (async) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r3, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000f80)=ANY=[@ANYBLOB="f5e4b9941dd171c9696f73c373681267ada2132e1859796e4f34fc368ae121bbed1e7048dbb2b39542b0ee590d3905164104311c91971eca368e705779d208aa7af4f50852651b2b3c950287b164c205dfb469e8cddfc1c22f2e5a133b47759071bae5002745308b222138b42c6be83baed6a82a09ccd9d610ec5189adf46ab7f472d28f26146096c525c5b700dbf3e3af13cc221be43b625f90e5bad4d64911921235ec62bbabafc57fb90b3cf8dfe267e831f92fb379dff9405a77f7e6a96e669f07a15a0581373922b8c702bfb6626a379d140c181a3f108d19951a7d9efd1c446f0cffbf7d9748d568207d5b3f6a2bce490d1341b1076bc4e889915ff2bfdff8513a35ba2b0b5466b9dedc96be10a170a78c0f95129fd6dffbf7eddb578fe3e3c9b1d5411a9c8e6af4d22a09e1", @ANYRES32=r1, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x1, 0x40, 0xff, 0x0, 0x0, 0x1, 0x400, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_bp={&(0x7f0000000740), 0x9}, 0x41082, 0xeb2, 0x80000001, 0x0, 0x2, 0xffffffff, 0x7, 0x0, 0x7fffffff, 0x0, 0x9}, 0x0, 0x7, r0, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xd5, 0xd9, &(0x7f0000000000)="1198e5fe21ec91c6f859130c8d98d423dde576da26155b63160621455b20491461b9b30aea741fc0f826d10143fedfe6c9c77008667b7dd9a22f5c9ebd00f00958248e200c6d41d337352e36697381994373d279f5c77e4bf237823a49e1ac2856ce2c3c2fe60cd1fd0496c64b5c2e6d1c2751cb47ffb51d988f6696a213559bd57b278f4197fde1d3efb585a2c7207ca4f7111bd2916d2089ef42a5d115fbf176f2d41fb52ea5a941081c52020c59aadd66b3b38f04c65aa039a5df8bb4d0d93e3c71efefc71267fcc5628a2c2601d60699655d7e", &(0x7f0000000200)=""/217, 0xee, 0x0, 0xdd, 0xd7, &(0x7f0000000300)="5694802af5dcc47652f701323800884ff0405f7a0cef4a9ffd8b51ffa5fff09c19c629b16c8594f9125bd24ee6a646ea9a6b7194f3f758b8ced11f50dd7e6b98bcf1c3f7b3912152d40b884ba04e5ececf955137a6df37fa8f5a21f70625e8adfe5adcbc3c1f3a21f9add62649202c637934534641d3958e00460b2a66445c637b52ca709d21a607d4ed81bbb9c1a69e027ff9ca5c624b140a13702ac196c5a0f0ac707cfe8c3b43e1f8384cd7b10f85b61d2f92d00807c6c75b009bb6545c77981dbf99e405d872ebd5425ee62183f2a122aa36381843b7cb1bbf3419", &(0x7f00000004c0)="892a44d8ad2694637ba1f5916138b035fdcdf7de2667f360d5a7ab2b83fcd9f9ef52ddc184543502e2a6073c38947ab786d334ca9481883135c10801e1fe7491697bde3c9b85532f6affaa76c937be348b91ef073f1104cedf70e6722e52cb98a2df082f120094b80546350c3874cae233ab5dce68a038d97b593e738bb6a8e7d6113acbc86dfc95525627d1d387211dcda81fba083c53c0d494f748521e32c54977553fd808cceea10cd3a4fe892241d95679dfcb0137ad291a48a104ce225f520c6a6ee91d5b72e60c566e09a85f8d10f913ebf9d82e", 0x1, 0x9}, 0x48) (async) getpid() (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000b40)=@filter={'filter\x00', 0xe, 0x4, 0x3c8, 0xffffffff, 0x0, 0x1f8, 0x0, 0xffffffff, 0xffffffff, 0x2f8, 0x2f8, 0x2f8, 0xffffffff, 0x4, &(0x7f0000000700), {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@eui64={{0x28}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x2, 0x4}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@inet=@dccp={{0x30}, {[0x4e20, 0x4e20], [0x4e23, 0x4e20], 0x5, 0x4, 0x100, 0x6}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x5, 0x9, 0x2}}}, {{@ipv6={@mcast2, @private0, [0xffffff00, 0xffffffff, 0x0, 0xff000000], [0x0, 0x0, 0xff000000, 0xff], 'veth0_vlan\x00', '\x00', {}, {}, 0x2f, 0x3, 0x3}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x4, 0x0, 0x3}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x428) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:25:27 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf2010000) 09:25:28 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 894.167797] xt_CT: You must specify a L4 protocol and not use inversions on it [ 894.178830] x_tables: duplicate underflow at hook 2 09:25:28 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6c01000000000000) 09:25:28 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8001000000000000) 09:25:28 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf3000000) 09:25:28 executing program 4: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000100)="eb3c906d8d6673fdd25ff889821dd8", 0xf}, {0x0, 0x0, 0x400000008000}], 0x8040, &(0x7f00000000c0)=ANY=[@ANYBLOB="646f733178056c6f7070792c00"], 0x0) 09:25:28 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0xffffffeffffffffe, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 32) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 32) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(r0, 0x0, 0x0) (async, rerun: 64) sendfile(r5, r3, 0x0, 0x800100020046) (async, rerun: 64) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:28 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6d00000000000000) 09:25:28 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8100000000000000) 09:25:28 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf3010000) 09:25:28 executing program 4: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000100)="eb3c906d8d6673fdd25ff889821dd8", 0xf}, {0x0, 0x0, 0x400000008000}], 0x8040, &(0x7f00000000c0)=ANY=[@ANYBLOB="646f733178056c6f7070792c00"], 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000100)="eb3c906d8d6673fdd25ff889821dd8", 0xf}, {0x0, 0x0, 0x400000008000}], 0x8040, &(0x7f00000000c0)=ANY=[@ANYBLOB="646f733178056c6f7070792c00"], 0x0) (async) 09:25:28 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8101000000000000) 09:25:28 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6d01000000000000) 09:25:28 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x36, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:28 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf4000000) 09:25:28 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8200000000000000) 09:25:28 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:28 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6e00000000000000) 09:25:28 executing program 4: syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000100)="eb3c906d8d6673fdd25ff889821dd8", 0xf}, {0x0, 0x0, 0x400000008000}], 0x8040, &(0x7f00000000c0)=ANY=[@ANYBLOB="646f733178056c6f7070792c00"], 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000100)="eb3c906d8d6673fdd25ff889821dd8", 0xf}, {0x0, 0x0, 0x400000008000}], 0x8040, &(0x7f00000000c0)=ANY=[@ANYBLOB="646f733178056c6f7070792c00"], 0x0) (async) 09:25:28 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8201000000000000) 09:25:28 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8300000000000000) 09:25:28 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='minix\x00', 0x20004, &(0x7f00000001c0)='iso9660\x00') 09:25:28 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6e01000000000000) 09:25:28 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf4010000) 09:25:28 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8301000000000000) 09:25:28 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x36, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4}, 0x1c) (async, rerun: 64) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 64) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async, rerun: 32) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async, rerun: 32) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 895.017363] print_req_error: I/O error, dev loop9, sector 64 [ 895.026401] isofs_fill_super: bread failed, dev=loop9, iso_blknum=16, block=32 09:25:28 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6f00000000000000) 09:25:28 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf5000000) 09:25:29 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:29 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8400000000000000) 09:25:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x1) (async) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='minix\x00', 0x20004, &(0x7f00000001c0)='iso9660\x00') 09:25:29 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x6f01000000000000) 09:25:29 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf5010000) 09:25:29 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x36, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x36, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) [ 895.462261] print_req_error: I/O error, dev loop9, sector 64 [ 895.475922] isofs_fill_super: bread failed, dev=loop9, iso_blknum=16, block=32 [ 895.487657] kauditd_printk_skb: 48 callbacks suppressed 09:25:29 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8401000000000000) 09:25:29 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7000000000000000) [ 895.487670] audit: type=1804 audit(1663925129.250:2555): pid=20926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/356/bus" dev="sda1" ino=14049 res=1 09:25:29 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf6000000) 09:25:29 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) (async) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='minix\x00', 0x20004, &(0x7f00000001c0)='iso9660\x00') 09:25:29 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7001000000000000) 09:25:29 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf6010000) 09:25:29 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:29 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x161800, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 895.680904] print_req_error: I/O error, dev loop9, sector 64 [ 895.686976] isofs_fill_super: bread failed, dev=loop9, iso_blknum=16, block=32 09:25:29 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8500000000000000) 09:25:29 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7100000000000000) 09:25:29 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0xc5, 0x0, 0x0, 0x6, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x2a8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x8108551b, &(0x7f0000000380)) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xbb6ef51032a80001) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000000)={0xf4, 0x0, 0x0, 'queue1\x00'}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x84, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x5}, @raw32}], 0x1c) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000200), 0x2) 09:25:29 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf7000000) [ 895.774098] audit: type=1804 audit(1663925129.300:2556): pid=20929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1442/bus" dev="sda1" ino=14322 res=1 09:25:29 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf7010000) 09:25:29 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8501000000000000) 09:25:29 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7101000000000000) [ 895.824014] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.4' sets config #0 [ 895.874315] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.4' sets config #1 09:25:29 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf8000000) 09:25:29 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8600000000000000) 09:25:29 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7200000000000000) [ 895.974968] net_ratelimit: 7 callbacks suppressed [ 895.974978] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 896.019416] audit: type=1804 audit(1663925129.680:2557): pid=20965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/357/bus" dev="sda1" ino=14347 res=1 09:25:29 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 896.281713] audit: type=1804 audit(1663925129.690:2558): pid=20967 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1443/bus" dev="sda1" ino=13877 res=1 [ 896.306230] audit: type=1804 audit(1663925129.910:2559): pid=20971 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1443/bus" dev="sda1" ino=13877 res=1 [ 896.330394] audit: type=1804 audit(1663925130.050:2560): pid=20981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/358/bus" dev="sda1" ino=13923 res=1 09:25:30 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x161800, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x161800, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:30 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0xc5, 0x0, 0x0, 0x6, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x2a8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x8108551b, &(0x7f0000000380)) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) (async) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xbb6ef51032a80001) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000000)={0xf4, 0x0, 0x0, 'queue1\x00'}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) (async) write$sndseq(r3, &(0x7f0000000000)=[{0x84, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x5}, @raw32}], 0x1c) (async) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000200), 0x2) 09:25:30 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8601000000000000) 09:25:30 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7201000000000000) 09:25:30 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:30 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf8010000) 09:25:30 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8700000000000000) 09:25:30 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7300000000000000) 09:25:30 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf9000000) [ 896.513980] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.4' sets config #0 [ 896.573368] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.4' sets config #1 09:25:30 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8701000000000000) 09:25:30 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7301000000000000) [ 896.604779] audit: type=1804 audit(1663925130.370:2561): pid=21004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/359/bus" dev="sda1" ino=13877 res=1 [ 896.669142] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:30 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 896.818343] audit: type=1804 audit(1663925130.410:2562): pid=21007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1444/bus" dev="sda1" ino=14691 res=1 09:25:30 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 64) open(&(0x7f0000000180)='./file0\x00', 0x161800, 0x0) (async, rerun: 64) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (async, rerun: 64) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:30 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf9010000) [ 896.954782] audit: type=1804 audit(1663925130.570:2563): pid=21010 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1444/bus" dev="sda1" ino=14691 res=1 09:25:30 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:30 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0xc5, 0x0, 0x0, 0x6, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x2a8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x8108551b, &(0x7f0000000380)) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect={0x1, 0x5517, 0x1000000}) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xbb6ef51032a80001) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000000)={0xf4, 0x0, 0x0, 'queue1\x00'}) (async) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x84, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x5}, @raw32}], 0x1c) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) sendfile(r3, r4, &(0x7f0000000200), 0x2) 09:25:30 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7400000000000000) 09:25:30 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8800000000000000) [ 896.991188] audit: type=1804 audit(1663925130.720:2564): pid=21036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/360/bus" dev="sda1" ino=13877 res=1 09:25:30 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfa000000) 09:25:30 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7401000000000000) 09:25:30 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8801000000000000) [ 897.094429] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.4' sets config #0 [ 897.152247] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:31 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfa010000) 09:25:31 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7500000000000000) 09:25:31 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:31 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x6e22, 0x0, @loopback, 0xc0}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x76, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x0, 0xa11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.cpus\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x2) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x3, 0xff, 0x9b, 0x0, 0x0, 0x6, 0x84040, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x800, 0xcf9259b90e33a7fc, @perf_bp={&(0x7f00000001c0), 0x2}, 0x50214, 0x800, 0x3, 0x0, 0x101, 0x10000, 0x7a80, 0x0, 0x0, 0x0, 0x7}, r0, 0x4, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1f, 0x1, 0x0, 0x1, 0x0, 0x0, 0x356e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x20, 0x2000000000000000, 0x0, 0x2, 0x3, 0x0, 0xfff8, 0x0, 0x6}, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r1, 0x100000003, 0x800000, 0x80019c) lseek(r1, 0x0, 0x3) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x802, 0x0) write(r4, &(0x7f0000000180)="d02f322469d8d101610d902bc6", 0xd) 09:25:31 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8900000000000000) 09:25:31 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfb000000) 09:25:31 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7501000000000000) 09:25:31 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x76, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x0, 0xa11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.cpus\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x2) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x3, 0xff, 0x9b, 0x0, 0x0, 0x6, 0x84040, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x800, 0xcf9259b90e33a7fc, @perf_bp={&(0x7f00000001c0), 0x2}, 0x50214, 0x800, 0x3, 0x0, 0x101, 0x10000, 0x7a80, 0x0, 0x0, 0x0, 0x7}, r0, 0x4, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1f, 0x1, 0x0, 0x1, 0x0, 0x0, 0x356e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x20, 0x2000000000000000, 0x0, 0x2, 0x3, 0x0, 0xfff8, 0x0, 0x6}, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0) fallocate(r1, 0x100000003, 0x800000, 0x80019c) lseek(r1, 0x0, 0x3) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x802, 0x0) write(r4, &(0x7f0000000180)="d02f322469d8d101610d902bc6", 0xd) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x76, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x0, 0xa11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) getpid() (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.cpus\x00', 0x2, 0x0) (async) creat(&(0x7f0000000100)='./bus\x00', 0x0) (async) creat(&(0x7f0000000300)='./bus\x00', 0x2) (async) creat(&(0x7f0000000000)='./bus\x00', 0x0) (async) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x3, 0xff, 0x9b, 0x0, 0x0, 0x6, 0x84040, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x800, 0xcf9259b90e33a7fc, @perf_bp={&(0x7f00000001c0), 0x2}, 0x50214, 0x800, 0x3, 0x0, 0x101, 0x10000, 0x7a80, 0x0, 0x0, 0x0, 0x7}, r0, 0x4, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) (async) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000380)) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1f, 0x1, 0x0, 0x1, 0x0, 0x0, 0x356e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x20, 0x2000000000000000, 0x0, 0x2, 0x3, 0x0, 0xfff8, 0x0, 0x6}, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0) (async) fallocate(r1, 0x100000003, 0x800000, 0x80019c) (async) lseek(r1, 0x0, 0x3) (async) openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x802, 0x0) (async) write(r4, &(0x7f0000000180)="d02f322469d8d101610d902bc6", 0xd) (async) 09:25:31 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfb010000) 09:25:31 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7600000000000000) 09:25:31 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8901000000000000) 09:25:32 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040), 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:32 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8a00000000000000) 09:25:32 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x6e22, 0x0, @loopback, 0xc0}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x6e22, 0x0, @loopback, 0xc0}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:32 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfc000000) 09:25:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x76, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x0, 0xa11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 32) r0 = getpid() (rerun: 32) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x3, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (rerun: 64) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.cpus\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) (async, rerun: 32) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x2) (rerun: 32) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x3, 0xff, 0x9b, 0x0, 0x0, 0x6, 0x84040, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x800, 0xcf9259b90e33a7fc, @perf_bp={&(0x7f00000001c0), 0x2}, 0x50214, 0x800, 0x3, 0x0, 0x101, 0x10000, 0x7a80, 0x0, 0x0, 0x0, 0x7}, r0, 0x4, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) (async) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000380)) (async) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x1f, 0x1, 0x0, 0x1, 0x0, 0x0, 0x356e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x20, 0x2000000000000000, 0x0, 0x2, 0x3, 0x0, 0xfff8, 0x0, 0x6}, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[], 0x1a0) (async) fallocate(r1, 0x100000003, 0x800000, 0x80019c) lseek(r1, 0x0, 0x3) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x802, 0x0) write(r4, &(0x7f0000000180)="d02f322469d8d101610d902bc6", 0xd) 09:25:32 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7601000000000000) 09:25:32 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8a01000000000000) 09:25:32 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfc010000) 09:25:32 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8b00000000000000) 09:25:32 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7700000000000000) 09:25:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5535, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x1, 0x10}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x5065) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r6 = accept4(r5, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000700)={@empty, 0x9, 0x1, 0x1, 0xc, 0x20, 0xffff}, 0x20) r7 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r7, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0x8, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r7, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x2}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x40004) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@local, @private1, @remote, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20c301e2, r4}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xffff0000, 0x1, 0x7, 0x40, r0, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x4, 0x4, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xd, 0x5, 0x4, 0x3fffffe, 0x0, r0}, 0x48) 09:25:32 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:32 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfd000000) 09:25:32 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8b01000000000000) 09:25:32 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x6e22, 0x0, @loopback, 0xc0}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:32 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfd010000) 09:25:32 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8c00000000000000) [ 898.724551] xt_CT: You must specify a L4 protocol and not use inversions on it 09:25:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5535, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x4, 0x2}, 0x48) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x1, 0x10}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x5065) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r6 = accept4(r5, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000700)={@empty, 0x9, 0x1, 0x1, 0xc, 0x20, 0xffff}, 0x20) (async) r7 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r7, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0x8, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r7, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x2}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x40004) (async) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@local, @private1, @remote, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20c301e2, r4}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xffff0000, 0x1, 0x7, 0x40, r0, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x4, 0x4, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xd, 0x5, 0x4, 0x3fffffe, 0x0, r0}, 0x48) 09:25:32 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfe000000) 09:25:32 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7701000000000000) [ 898.850176] xt_CT: You must specify a L4 protocol and not use inversions on it 09:25:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5535, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x1, 0x10}, 0xc) (async) r1 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x5065) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) r6 = accept4(r5, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000700)={@empty, 0x9, 0x1, 0x1, 0xc, 0x20, 0xffff}, 0x20) (async) r7 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r7, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0x8, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r7, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) (async) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x2}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x40004) (async) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@local, @private1, @remote, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20c301e2, r4}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xffff0000, 0x1, 0x7, 0x40, r0, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x4, 0x4, 0x3}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xd, 0x5, 0x4, 0x3fffffe, 0x0, r0}, 0x48) 09:25:32 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8c01000000000000) 09:25:32 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:32 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7800000000000000) 09:25:32 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xfe010000) [ 898.965904] xt_CT: You must specify a L4 protocol and not use inversions on it 09:25:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5535, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x2, 0x4, 0x4, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x1, 0x10}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x8) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000015c0)=0x5065) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r6 = accept4(r5, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000700)={@empty, 0x9, 0x1, 0x1, 0xc, 0x20, 0xffff}, 0x20) r7 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r7, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0x8, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r7, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="f5e4b9941dd171c9696f73c373681267ada2132e1859796e4f34fc368ae121bbed1e7048dbb2b39542bd9f65247d0394593d2cb0ee590d3905164104311c91971eca364a705779d208aa7af4f50852651b2b3c950287b164c205dfb469e8cddfc1c22f2e5a133b47759071ba2f072745308b222138b42c6be83baed6a82a09ccd9d410ec5189adf46ab7f472d28f26146096c525c5b74bdbf3e3af13cc221be43b625f90e5bad4d64911921235ec62bbabafc57fb90b3cf8dfe267e831f92fb379dff9405a77f7d2a96e669f07a15a0581373922b8c702bfb6626a379d140c181a3f108d19951a7d9efd1c446f0cffbf7d9748d568207d5b3f6a2bce490d1341b1076bc4e889915ff2bfdff0513a35ba2b0b5466b9dedc", @ANYRES32=r5, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r7, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x800, 0x70bd28, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_LANES={0x8, 0x9, 0x2}, @ETHTOOL_A_LINKMODES_MASTER_SLAVE_CFG={0x5, 0x7, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000040}, 0x40004) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@local, @private1, @remote, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20c301e2, r4}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xffff0000, 0x1, 0x7, 0x40, r0, 0x200, '\x00', r4, 0xffffffffffffffff, 0x1, 0x4, 0x4, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xd, 0x5, 0x4, 0x3fffffe, 0x0, r0}, 0x48) 09:25:32 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8d00000000000000) 09:25:32 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7801000000000000) 09:25:32 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffffd}, 0xbfb97036648265cd, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x3ff, @private2={0xfc, 0x2, '\x00', 0x9}}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:32 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xff000000) 09:25:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getpgrp(r0) get_robust_list(0x0, 0x0, 0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, 0x0, 0x4000810) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000600)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xd) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setlease(r3, 0x400, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x4400, 0x0) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000000080)={0x1}) r4 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r4, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) ioctl$KDADDIO(r4, 0x4b34, 0x8) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYBLOB="70002ea132749b1a6b95c61fed5c7c341108bde29934173e4d436e8cba8bef4183c6f8cceeca2fc49fdd0bceb106a0782fe10154f199d9521f8876af17091df1c254b0ebdefe7876961e017480805389d20905fecf7b54a7cbde1edc6bf491965b70c139994c94d3efd96ce933b21b90bba56d91841eb1d35219b5053462", @ANYRES32=r2, @ANYRESHEX, @ANYBLOB="c7b2d0f154760515a71e9e8dcb157a4a362620bb68aa6e6c41a2dbc5fd38dd694a6b7afbf8c20192bcdb0778769d89ac0477db68d83f8d5e1ee8ce6b8293126d10aa0e13232c38f65375e4c7f21f55f83e2181c76432f09172974a09327d9e8eab92ee4e9700f0e327ca0004e5f0014403f35d9d174fb8fea54cf5b211d86cde68f8e433b03cabe0d1240819180bdae2d0ea"], 0x58}}, 0x3b49aeed3ba9c75c) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) [ 899.121358] xt_CT: You must specify a L4 protocol and not use inversions on it 09:25:32 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:32 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xff010000) 09:25:32 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7900000000000000) 09:25:32 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8d01000000000000) 09:25:33 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x200000000000) 09:25:33 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8e00000000000000) 09:25:33 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7901000000000000) 09:25:33 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffffd}, 0xbfb97036648265cd, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x3ff, @private2={0xfc, 0x2, '\x00', 0x9}}, 0x1c) listen(r3, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r4, r2, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:33 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1000000000000) 09:25:33 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8e01000000000000) 09:25:33 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7a00000000000000) 09:25:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getpgrp(r0) get_robust_list(0x0, 0x0, 0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, 0x0, 0x4000810) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000600)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xd) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setlease(r3, 0x400, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x4400, 0x0) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000000080)={0x1}) r4 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r4, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) ioctl$KDADDIO(r4, 0x4b34, 0x8) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYBLOB="70002ea132749b1a6b95c61fed5c7c341108bde29934173e4d436e8cba8bef4183c6f8cceeca2fc49fdd0bceb106a0782fe10154f199d9521f8876af17091df1c254b0ebdefe7876961e017480805389d20905fecf7b54a7cbde1edc6bf491965b70c139994c94d3efd96ce933b21b90bba56d91841eb1d35219b5053462", @ANYRES32=r2, @ANYRESHEX, @ANYBLOB="c7b2d0f154760515a71e9e8dcb157a4a362620bb68aa6e6c41a2dbc5fd38dd694a6b7afbf8c20192bcdb0778769d89ac0477db68d83f8d5e1ee8ce6b8293126d10aa0e13232c38f65375e4c7f21f55f83e2181c76432f09172974a09327d9e8eab92ee4e9700f0e327ca0004e5f0014403f35d9d174fb8fea54cf5b211d86cde68f8e433b03cabe0d1240819180bdae2d0ea"], 0x58}}, 0x3b49aeed3ba9c75c) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getpid() (async) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) (async) getpgrp(r0) (async) get_robust_list(0x0, 0x0, 0x0) (async) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, 0x0, 0x4000810) (async) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000600)=0x14) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xd) (async) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) (async) open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) (async) fcntl$setlease(r3, 0x400, 0x0) (async) open(&(0x7f00009e1000)='./file0\x00', 0x4400, 0x0) (async) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000000080)={0x1}) (async) syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) (async) sendto$inet6(r4, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) (async) ioctl$KDADDIO(r4, 0x4b34, 0x8) (async) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYBLOB="70002ea132749b1a6b95c61fed5c7c341108bde29934173e4d436e8cba8bef4183c6f8cceeca2fc49fdd0bceb106a0782fe10154f199d9521f8876af17091df1c254b0ebdefe7876961e017480805389d20905fecf7b54a7cbde1edc6bf491965b70c139994c94d3efd96ce933b21b90bba56d91841eb1d35219b5053462", @ANYRES32=r2, @ANYRESHEX, @ANYBLOB="c7b2d0f154760515a71e9e8dcb157a4a362620bb68aa6e6c41a2dbc5fd38dd694a6b7afbf8c20192bcdb0778769d89ac0477db68d83f8d5e1ee8ce6b8293126d10aa0e13232c38f65375e4c7f21f55f83e2181c76432f09172974a09327d9e8eab92ee4e9700f0e327ca0004e5f0014403f35d9d174fb8fea54cf5b211d86cde68f8e433b03cabe0d1240819180bdae2d0ea"], 0x58}}, 0x3b49aeed3ba9c75c) (async) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) (async) 09:25:33 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:33 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7a01000000000000) 09:25:33 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffffd}, 0xbfb97036648265cd, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x3ff, @private2={0xfc, 0x2, '\x00', 0x9}}, 0x1c) (async) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:33 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2000000000000) 09:25:33 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8f00000000000000) 09:25:33 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x20, 0x20, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffeffffffffb, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2803ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./bus\x00', 0x62800, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x304}, '\x00', "caeeaabec72b682fff000600", "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x4) 09:25:33 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8f01000000000000) 09:25:33 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7ffffffffffff) 09:25:33 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7b00000000000000) 09:25:33 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x100000000000000) 09:25:33 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 899.969214] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) (async) getpgrp(r0) get_robust_list(0x0, 0x0, 0x0) (async) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, 0x0, 0x4000810) (async, rerun: 64) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (rerun: 64) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000600)=0x14) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xd) (async) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) (async) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setlease(r3, 0x400, 0x0) (async) open(&(0x7f00009e1000)='./file0\x00', 0x4400, 0x0) ioctl$VIDIOC_G_FREQUENCY(0xffffffffffffffff, 0xc02c5638, &(0x7f0000000080)={0x1}) (async) r4 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r4, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r4, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00080000000000002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) (async) ioctl$KDADDIO(r4, 0x4b34, 0x8) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYBLOB="70002ea132749b1a6b95c61fed5c7c341108bde29934173e4d436e8cba8bef4183c6f8cceeca2fc49fdd0bceb106a0782fe10154f199d9521f8876af17091df1c254b0ebdefe7876961e017480805389d20905fecf7b54a7cbde1edc6bf491965b70c139994c94d3efd96ce933b21b90bba56d91841eb1d35219b5053462", @ANYRES32=r2, @ANYRESHEX, @ANYBLOB="c7b2d0f154760515a71e9e8dcb157a4a362620bb68aa6e6c41a2dbc5fd38dd694a6b7afbf8c20192bcdb0778769d89ac0477db68d83f8d5e1ee8ce6b8293126d10aa0e13232c38f65375e4c7f21f55f83e2181c76432f09172974a09327d9e8eab92ee4e9700f0e327ca0004e5f0014403f35d9d174fb8fea54cf5b211d86cde68f8e433b03cabe0d1240819180bdae2d0ea"], 0x58}}, 0x3b49aeed3ba9c75c) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 09:25:34 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7b01000000000000) 09:25:34 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9000000000000000) 09:25:34 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x101000000000000) 09:25:34 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:34 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9001000000000000) [ 900.626770] kauditd_printk_skb: 20 callbacks suppressed [ 900.626784] audit: type=1804 audit(1663925134.400:2585): pid=21379 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/370/bus" dev="sda1" ino=13900 res=1 09:25:34 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x20, 0x20, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffeffffffffb, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2803ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./bus\x00', 0x62800, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x304}, '\x00', "caeeaabec72b682fff000600", "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000100)='./bus\x00', 0x4) 09:25:34 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x200000000000000) 09:25:34 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9100000000000000) 09:25:34 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:34 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7c00000000000000) 09:25:34 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:34 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x20, 0x20, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffeffffffffb, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2803ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async, rerun: 64) listen(r4, 0x0) (async, rerun: 64) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./bus\x00', 0x62800, 0x1) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x304}, '\x00', "caeeaabec72b682fff000600", "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000100)='./bus\x00', 0x4) 09:25:34 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7c01000000000000) 09:25:34 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x201000000000000) [ 900.844753] audit: type=1804 audit(1663925134.610:2586): pid=21397 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1453/bus" dev="sda1" ino=15206 res=1 09:25:34 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:34 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9101000000000000) 09:25:34 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x300000000000000) [ 900.953114] audit: type=1804 audit(1663925134.610:2587): pid=21398 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1453/bus" dev="sda1" ino=15206 res=1 09:25:34 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7d00000000000000) 09:25:34 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9200000000000000) 09:25:34 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x100) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 901.030598] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:34 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x301000000000000) 09:25:34 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7d01000000000000) [ 901.139685] audit: type=1804 audit(1663925134.670:2588): pid=21402 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/371/bus" dev="sda1" ino=15203 res=1 09:25:34 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xe0101, 0x14) write$tcp_congestion(r1, &(0x7f00000000c0)='lp\x00', 0xfffffde4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000380)=0x4) dup2(r1, 0xffffffffffffffff) lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000400)='system.posix_acl_access\x00', &(0x7f0000001440)=ANY=[@ANYBLOB, @ANYRES32=0xee00, @ANYBLOB="02000400e1a154e1b89035c01997556cc2fdf89b54fdd2a1c54f3fb8e6719a73a84144c10beb7610e7be53f289281c5ca7d70605b815c748af4b83f72232b98790173e58ecd934395569", @ANYRES32, @ANYBLOB="02000300", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB='o{+', @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="03a70fd708001c59a30100", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32, @ANYBLOB="10000500000000002000040000000000"], 0x9c, 0x3) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) sendmsg(r2, &(0x7f00000003c0)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x2, @empty, 'virt_wifi0\x00'}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)="6569023ee57a755db008d2a85e9e991e135205fe064fc8ca2830f599197e39eae47d79fd56e4c6ae15bd69f4574ffc611b194f69e5fde513dc852d97b31d264d0b97c18f4df4ef1e47b3a5e6b7be8a224036fc44777e0063a0422a4e515dc8956888660585959af13a60e12131339deaa9b7f30d801b32a7f934abbf963fe6c6195cb82ae53ae4448c834aca4b8d0fe4edac5e73e179711ff0342d", 0x9b}, {&(0x7f0000000540)="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", 0xf00}, {&(0x7f0000001540)="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", 0x5e8}, {&(0x7f0000000300)}], 0x4, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], 0x2e0}, 0x40) syz_open_dev$usbfs(0x0, 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000000000)=0x7fffffff) preadv2(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)=""/87, 0x57}], 0x1, 0x41, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$SNDCTL_DSP_SETFRAGMENT(r3, 0xc004500a, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0xa00, 0xfffffffffffffd83, 0xfa00, {0x0, 0x0}}, 0xfdbc) 09:25:34 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9201000000000000) [ 901.206329] audit: type=1804 audit(1663925134.790:2589): pid=21417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1454/bus" dev="sda1" ino=15139 res=1 09:25:35 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:35 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x400000000000000) 09:25:35 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9300000000000000) [ 901.247753] audit: type=1804 audit(1663925134.800:2590): pid=21417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1454/bus" dev="sda1" ino=15139 res=1 09:25:35 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7e00000000000000) [ 901.307134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:35 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x100) (async) sendfile(r4, r2, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:35 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x401000000000000) [ 901.468798] audit: type=1804 audit(1663925134.820:2591): pid=21419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1454/bus" dev="sda1" ino=15139 res=1 09:25:35 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:35 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9301000000000000) 09:25:35 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7e01000000000000) [ 901.548533] audit: type=1804 audit(1663925134.910:2592): pid=21429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1886/bus" dev="sda1" ino=15107 res=1 09:25:35 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x500000000000000) [ 901.651021] audit: type=1804 audit(1663925134.950:2593): pid=21430 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/372/bus" dev="sda1" ino=15187 res=1 [ 901.696637] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 901.722964] audit: type=1804 audit(1663925135.080:2594): pid=21441 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1455/bus" dev="sda1" ino=15026 res=1 09:25:35 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xe0101, 0x14) write$tcp_congestion(r1, &(0x7f00000000c0)='lp\x00', 0xfffffde4) (async) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000380)=0x4) (async) dup2(r1, 0xffffffffffffffff) (async) lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000400)='system.posix_acl_access\x00', &(0x7f0000001440)=ANY=[@ANYBLOB, @ANYRES32=0xee00, @ANYBLOB="02000400e1a154e1b89035c01997556cc2fdf89b54fdd2a1c54f3fb8e6719a73a84144c10beb7610e7be53f289281c5ca7d70605b815c748af4b83f72232b98790173e58ecd934395569", @ANYRES32, @ANYBLOB="02000300", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB='o{+', @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="03a70fd708001c59a30100", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32, @ANYBLOB="10000500000000002000040000000000"], 0x9c, 0x3) (async) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) (async) sendmsg(r2, &(0x7f00000003c0)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x2, @empty, 'virt_wifi0\x00'}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)="6569023ee57a755db008d2a85e9e991e135205fe064fc8ca2830f599197e39eae47d79fd56e4c6ae15bd69f4574ffc611b194f69e5fde513dc852d97b31d264d0b97c18f4df4ef1e47b3a5e6b7be8a224036fc44777e0063a0422a4e515dc8956888660585959af13a60e12131339deaa9b7f30d801b32a7f934abbf963fe6c6195cb82ae53ae4448c834aca4b8d0fe4edac5e73e179711ff0342d", 0x9b}, {&(0x7f0000000540)="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", 0xf00}, {&(0x7f0000001540)="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", 0x5e8}, {&(0x7f0000000300)}], 0x4, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], 0x2e0}, 0x40) syz_open_dev$usbfs(0x0, 0x0, 0x0) (async) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000000000)=0x7fffffff) preadv2(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)=""/87, 0x57}], 0x1, 0x41, 0x0, 0x0) (async) dup3(0xffffffffffffffff, r0, 0x80000) (async) ioctl$SNDCTL_DSP_SETFRAGMENT(r3, 0xc004500a, &(0x7f0000000040)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0xa00, 0xfffffffffffffd83, 0xfa00, {0x0, 0x0}}, 0xfdbc) 09:25:35 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9400000000000000) 09:25:35 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x100) (async) sendfile(r4, r2, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async, rerun: 64) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:35 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7f00000000000000) 09:25:35 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:35 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x501000000000000) 09:25:35 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x600000000000000) 09:25:35 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9401000000000000) [ 902.100502] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:35 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x601000000000000) 09:25:35 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x7f01000000000000) 09:25:36 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:36 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9500000000000000) 09:25:36 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xe0101, 0x14) write$tcp_congestion(r1, &(0x7f00000000c0)='lp\x00', 0xfffffde4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000380)=0x4) (async) dup2(r1, 0xffffffffffffffff) lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000400)='system.posix_acl_access\x00', &(0x7f0000001440)=ANY=[@ANYBLOB, @ANYRES32=0xee00, @ANYBLOB="02000400e1a154e1b89035c01997556cc2fdf89b54fdd2a1c54f3fb8e6719a73a84144c10beb7610e7be53f289281c5ca7d70605b815c748af4b83f72232b98790173e58ecd934395569", @ANYRES32, @ANYBLOB="02000300", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB='o{+', @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="03a70fd708001c59a30100", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32, @ANYBLOB="10000500000000002000040000000000"], 0x9c, 0x3) (async) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNENABLEPIPE(r2, 0x89ed, 0x0) (async) sendmsg(r2, &(0x7f00000003c0)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x2, @empty, 'virt_wifi0\x00'}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)="6569023ee57a755db008d2a85e9e991e135205fe064fc8ca2830f599197e39eae47d79fd56e4c6ae15bd69f4574ffc611b194f69e5fde513dc852d97b31d264d0b97c18f4df4ef1e47b3a5e6b7be8a224036fc44777e0063a0422a4e515dc8956888660585959af13a60e12131339deaa9b7f30d801b32a7f934abbf963fe6c6195cb82ae53ae4448c834aca4b8d0fe4edac5e73e179711ff0342d", 0x9b}, {&(0x7f0000000540)="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", 0xf00}, {&(0x7f0000001540)="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", 0x5e8}, {&(0x7f0000000300)}], 0x4, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], 0x2e0}, 0x40) (async) syz_open_dev$usbfs(0x0, 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000000000)=0x7fffffff) (async) preadv2(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)=""/87, 0x57}], 0x1, 0x41, 0x0, 0x0) (async) dup3(0xffffffffffffffff, r0, 0x80000) ioctl$SNDCTL_DSP_SETFRAGMENT(r3, 0xc004500a, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0xa00, 0xfffffffffffffd83, 0xfa00, {0x0, 0x0}}, 0xfdbc) 09:25:36 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8001000000000000) 09:25:36 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x1f}, 0x2}, 0x32) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r6 = open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x304}, '\x00', "0000000100001a00", "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:36 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9501000000000000) 09:25:36 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x700000000000000) 09:25:36 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:36 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8100000000000000) 09:25:36 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9600000000000000) 09:25:36 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8101000000000000) 09:25:36 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x701000000000000) 09:25:36 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9601000000000000) 09:25:36 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x81) getpid() sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x4001) statx(0xffffffffffffff9c, &(0x7f0000007140)='./file0\x00', 0x800, 0x800, &(0x7f0000007180)) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) setreuid(0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="250000000000000000000600000008000300", @ANYRES32=r4, @ANYBLOB="08000500080000000500530000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 09:25:36 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:36 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8200000000000000) 09:25:36 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x1f}, 0x2}, 0x32) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) r6 = open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x304}, '\x00', "0000000100001a00", "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async, rerun: 32) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:36 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9700000000000000) 09:25:36 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x800000000000000) 09:25:36 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8201000000000000) 09:25:36 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9701000000000000) 09:25:37 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x801000000000000) 09:25:37 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x1f}, 0x2}, 0x32) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) r6 = open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x304}, '\x00', "0000000100001a00", "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:37 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:37 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8300000000000000) 09:25:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x81) (async) getpid() (async) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x4001) (async) statx(0xffffffffffffff9c, &(0x7f0000007140)='./file0\x00', 0x800, 0x800, &(0x7f0000007180)) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9) (async, rerun: 32) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x0) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) setreuid(0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="250000000000000000000600000008000300", @ANYRES32=r4, @ANYBLOB="08000500080000000500530000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 09:25:37 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9800000000000000) 09:25:37 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x900000000000000) 09:25:37 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8301000000000000) 09:25:37 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xb) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:37 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:37 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9801000000000000) 09:25:37 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x901000000000000) 09:25:37 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xb) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:37 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9900000000000000) 09:25:37 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8400000000000000) 09:25:37 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa00000000000000) [ 904.019292] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 904.039585] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 904.092796] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x81) (async) getpid() sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x4001) (async) statx(0xffffffffffffff9c, &(0x7f0000007140)='./file0\x00', 0x800, 0x800, &(0x7f0000007180)) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8b18, &(0x7f0000000000)={'wlan1\x00'}) (async) sendfile(r0, 0xffffffffffffffff, 0x0, 0x9) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) (async) setreuid(0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="250000000000000000000600000008000300", @ANYRES32=r4, @ANYBLOB="08000500080000000500530000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 09:25:38 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa01000000000000) 09:25:38 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xb) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xb) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:38 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9901000000000000) 09:25:38 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8401000000000000) 09:25:38 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:38 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8500000000000000) 09:25:38 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb00000000000000) 09:25:38 executing program 5: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x303}, "a1000005ffffe220", "00000000000000e8ffffffffffffff04", "20040100", '\x00\x00\x00\x00\x00\x00\x00\f'}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x200) syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 904.573436] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:38 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9a00000000000000) 09:25:38 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb01000000000000) 09:25:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)={'syz1'}, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(0xffffffffffffffff, &(0x7f0000000080)=0x104d, r3, &(0x7f0000000180)=0x5, 0xb0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) 09:25:38 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9a01000000000000) 09:25:38 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8501000000000000) 09:25:38 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc00000000000000) 09:25:38 executing program 5: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) (async) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async, rerun: 32) listen(r3, 0x0) (rerun: 32) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async, rerun: 64) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x303}, "a1000005ffffe220", "00000000000000e8ffffffffffffff04", "20040100", '\x00\x00\x00\x00\x00\x00\x00\f'}, 0x28) (async, rerun: 64) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(0xffffffffffffffff, r2, 0x0, 0x200) (async, rerun: 64) syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:38 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9b00000000000000) 09:25:38 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:38 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc01000000000000) 09:25:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)={'syz1'}, 0x4) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) (async) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) (async) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) (async) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) (async) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(0xffffffffffffffff, &(0x7f0000000080)=0x104d, r3, &(0x7f0000000180)=0x5, 0xb0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) 09:25:38 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8600000000000000) 09:25:38 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9b01000000000000) 09:25:39 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8601000000000000) 09:25:39 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xd00000000000000) 09:25:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)={'syz1'}, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) (async) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1fe}, 0x14) (async) write$binfmt_misc(r1, &(0x7f0000002400)=ANY=[], 0xff01) (async) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) splice(0xffffffffffffffff, &(0x7f0000000080)=0x104d, r3, &(0x7f0000000180)=0x5, 0xb0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) 09:25:39 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8700000000000000) 09:25:39 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9c00000000000000) [ 905.387802] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:39 executing program 5: open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, r0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000200)=@gcm_128={{0x303}, "a1000005ffffe220", "00000000000000e8ffffffffffffff04", "20040100", '\x00\x00\x00\x00\x00\x00\x00\f'}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(0xffffffffffffffff, r2, 0x0, 0x200) (async) syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:39 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xd01000000000000) 09:25:39 executing program 4: mknod(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) r0 = open(0x0, 0x420002, 0x0) dup(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0xc4803, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYRES64]) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x700, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x9, 0x27}, 0x121, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @tipc=@id={0x1e, 0x3, 0x1, {0x4e22, 0x4}}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6}, @qipcrtr={0x2a, 0x0, 0x7fff}, 0x756c, 0x0, 0x0, 0x0, 0xb0e, &(0x7f0000000040)='gretap0\x00', 0x8, 0x4, 0x9f}) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x4e22, @local}, {0x2, 0x4e20, @dev}, {0x2, 0x4e22, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x3ff, 0x3}) open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x124) keyctl$assume_authority(0x10, 0x0) unshare(0x60000000) 09:25:39 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9c01000000000000) 09:25:39 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8701000000000000) 09:25:39 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:39 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe00000000000000) [ 906.155784] kauditd_printk_skb: 31 callbacks suppressed [ 906.155797] audit: type=1804 audit(1663925139.921:2626): pid=21843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/383/bus" dev="sda1" ino=15267 res=1 09:25:40 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9d00000000000000) [ 906.241103] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:40 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8800000000000000) 09:25:40 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x3a80, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x105e}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0xd6) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "a0e40ea53ce8e11e", "b8355f13d2f1d743a7dcaf7cc7faa6d9", "f60fcf2f", "3b46523707e99647"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x2004480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:40 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xe01000000000000) 09:25:40 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9d01000000000000) [ 906.463234] audit: type=1804 audit(1663925140.001:2627): pid=21844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1466/bus" dev="sda1" ino=13875 res=1 [ 906.514747] IPVS: ftp: loaded support on port[0] = 21 09:25:40 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8801000000000000) 09:25:40 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf00000000000000) [ 906.694959] audit: type=1804 audit(1663925140.051:2628): pid=21844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1466/bus" dev="sda1" ino=13875 res=1 [ 906.826065] audit: type=1804 audit(1663925140.221:2629): pid=21850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/383/bus" dev="sda1" ino=15267 res=1 [ 906.888517] audit: type=1804 audit(1663925140.521:2630): pid=21874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1467/bus" dev="sda1" ino=15066 res=1 09:25:40 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:40 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9e00000000000000) 09:25:40 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8900000000000000) 09:25:40 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xf01000000000000) 09:25:40 executing program 4: mknod(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$assume_authority(0x10, 0x0) r0 = open(0x0, 0x420002, 0x0) dup(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0xc4803, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYRES64]) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x700, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x9, 0x27}, 0x121, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @tipc=@id={0x1e, 0x3, 0x1, {0x4e22, 0x4}}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6}, @qipcrtr={0x2a, 0x0, 0x7fff}, 0x756c, 0x0, 0x0, 0x0, 0xb0e, &(0x7f0000000040)='gretap0\x00', 0x8, 0x4, 0x9f}) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x4e22, @local}, {0x2, 0x4e20, @dev}, {0x2, 0x4e22, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x3ff, 0x3}) open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x124) keyctl$assume_authority(0x10, 0x0) unshare(0x60000000) mknod(0x0, 0x0, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) (async) keyctl$chown(0x4, 0x0, 0x0, 0x0) (async) keyctl$get_persistent(0x16, 0x0, 0x0) (async) keyctl$assume_authority(0x10, 0x0) (async) open(0x0, 0x420002, 0x0) (async) dup(0xffffffffffffffff) (async) openat$tun(0xffffffffffffff9c, 0x0, 0xc4803, 0x0) (async) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) (async) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYRES64]) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x700, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x9, 0x27}, 0x121, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) (async) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @tipc=@id={0x1e, 0x3, 0x1, {0x4e22, 0x4}}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6}, @qipcrtr={0x2a, 0x0, 0x7fff}, 0x756c, 0x0, 0x0, 0x0, 0xb0e, &(0x7f0000000040)='gretap0\x00', 0x8, 0x4, 0x9f}) (async) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) (async) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x4e22, @local}, {0x2, 0x4e20, @dev}, {0x2, 0x4e22, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x3ff, 0x3}) (async) open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x124) (async) keyctl$assume_authority(0x10, 0x0) (async) unshare(0x60000000) (async) 09:25:40 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x3a80, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x105e}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0xd6) ftruncate(r2, 0x2007ffb) (async, rerun: 32) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async, rerun: 32) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 32) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "a0e40ea53ce8e11e", "b8355f13d2f1d743a7dcaf7cc7faa6d9", "f60fcf2f", "3b46523707e99647"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x2004480, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:40 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9e01000000000000) 09:25:41 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1000000000000000) 09:25:41 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8901000000000000) [ 907.236904] audit: type=1804 audit(1663925141.011:2631): pid=21941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1468/bus" dev="sda1" ino=15575 res=1 [ 907.261863] IPVS: ftp: loaded support on port[0] = 21 09:25:41 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9f00000000000000) [ 907.302320] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:41 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x3a80, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x105e}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0xd6) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "a0e40ea53ce8e11e", "b8355f13d2f1d743a7dcaf7cc7faa6d9", "f60fcf2f", "3b46523707e99647"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x2004480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x3a80, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x105e}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0xd6) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(0xffffffffffffffff, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "a0e40ea53ce8e11e", "b8355f13d2f1d743a7dcaf7cc7faa6d9", "f60fcf2f", "3b46523707e99647"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x2004480, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:41 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1001000000000000) [ 907.388311] audit: type=1804 audit(1663925141.051:2632): pid=21946 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1468/bus" dev="sda1" ino=15575 res=1 [ 907.670956] audit: type=1804 audit(1663925141.071:2633): pid=21949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/384/bus" dev="sda1" ino=15573 res=1 09:25:41 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, 0x0, 0x0) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:41 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8a00000000000000) 09:25:41 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9f01000000000000) 09:25:41 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1100000000000000) [ 907.874952] audit: type=1804 audit(1663925141.231:2634): pid=21954 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/384/bus" dev="sda1" ino=15573 res=1 [ 907.898658] audit: type=1804 audit(1663925141.581:2635): pid=21964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1469/bus" dev="sda1" ino=14868 res=1 [ 908.127593] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:47 executing program 4: mknod(0x0, 0x0, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) (async) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) (async) keyctl$assume_authority(0x10, 0x0) (async) r0 = open(0x0, 0x420002, 0x0) (async) dup(0xffffffffffffffff) (async) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0xc4803, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) (async) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYRES64]) r2 = socket$inet_udp(0x2, 0x2, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x700, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3220c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x9, 0x27}, 0x121, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async) bind$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffff9) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @tipc=@id={0x1e, 0x3, 0x1, {0x4e22, 0x4}}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6}, @qipcrtr={0x2a, 0x0, 0x7fff}, 0x756c, 0x0, 0x0, 0x0, 0xb0e, &(0x7f0000000040)='gretap0\x00', 0x8, 0x4, 0x9f}) (async) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x750, {0x2, 0x4e22, @local}, {0x2, 0x4e20, @dev}, {0x2, 0x4e22, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x3ff, 0x3}) open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x124) keyctl$assume_authority(0x10, 0x0) unshare(0x60000000) 09:25:47 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0}, 0x0, 0xffffffffffffff6c, 0x0, 0x8, 0xffffffffffffffff}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:47 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa000000000000000) 09:25:47 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8a01000000000000) 09:25:47 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1101000000000000) 09:25:47 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:47 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa001000000000000) 09:25:47 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8b00000000000000) 09:25:47 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1200000000000000) 09:25:48 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0}, 0x0, 0xffffffffffffff6c, 0x0, 0x8, 0xffffffffffffffff}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:48 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8b01000000000000) [ 914.168817] IPVS: ftp: loaded support on port[0] = 21 [ 914.175040] kauditd_printk_skb: 2 callbacks suppressed [ 914.175054] audit: type=1804 audit(1663925147.941:2638): pid=22004 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1470/bus" dev="sda1" ino=13892 res=1 09:25:48 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1201000000000000) [ 914.263635] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 914.357454] audit: type=1804 audit(1663925148.011:2639): pid=22013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/386/bus" dev="sda1" ino=13951 res=1 09:25:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000000020000190000d21325e8c503c284ae03d373a32af900900100000f000000000000000200000006000000f1ff07000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100000000000000190000000004000008000000d2c200001203", 0x75, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[], 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000001c0)={'wg2\x00'}) r2 = socket(0x10, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="5000000024000b0f00"/20, @ANYRES64=r1], 0x50}, 0x1, 0x0, 0x0, 0x48084}, 0x41) recvfrom$unix(0xffffffffffffffff, &(0x7f0000001580)=""/210, 0xd2, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000008c0)={&(0x7f00000000c0)=@newsa={0x140, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in=@remote, 0x0, 0x3c}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@proto={0x5}, @algo_auth={0x48, 0x1, {{'cmac(aes)\x00'}}}]}, 0x140}}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) perf_event_open(&(0x7f0000001680)={0x5, 0x80, 0xee, 0x9, 0x2, 0x1, 0x0, 0x7, 0x100, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000014c0), 0x4}, 0x4a100, 0xac6e000000000000, 0x7f, 0x3, 0x101, 0xffffffff, 0x100, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0xb) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 09:25:48 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa100000000000000) 09:25:48 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8c00000000000000) 09:25:48 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1300000000000000) 09:25:48 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0}, 0x0, 0xffffffffffffff6c, 0x0, 0x8, 0xffffffffffffffff}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 914.604501] audit: type=1804 audit(1663925148.081:2640): pid=22020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1471/bus" dev="sda1" ino=13892 res=1 [ 914.695826] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 914.729136] audit: type=1804 audit(1663925148.301:2641): pid=22035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/386/bus" dev="sda1" ino=13951 res=1 [ 914.761570] audit: type=1804 audit(1663925148.461:2642): pid=22064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1472/bus" dev="sda1" ino=15681 res=1 09:25:48 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:48 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8c01000000000000) 09:25:48 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1301000000000000) 09:25:48 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:48 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa101000000000000) [ 914.817134] audit: type=1804 audit(1663925148.481:2643): pid=22060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1472/bus" dev="sda1" ino=15681 res=1 09:25:48 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8d00000000000000) 09:25:48 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa200000000000000) 09:25:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) (async) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) (async) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000000020000190000d21325e8c503c284ae03d373a32af900900100000f000000000000000200000006000000f1ff07000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100000000000000190000000004000008000000d2c200001203", 0x75, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[], 0x0) (async) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000001c0)={'wg2\x00'}) (async) r2 = socket(0x10, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) (async) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="5000000024000b0f00"/20, @ANYRES64=r1], 0x50}, 0x1, 0x0, 0x0, 0x48084}, 0x41) recvfrom$unix(0xffffffffffffffff, &(0x7f0000001580)=""/210, 0xd2, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000008c0)={&(0x7f00000000c0)=@newsa={0x140, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in=@remote, 0x0, 0x3c}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@proto={0x5}, @algo_auth={0x48, 0x1, {{'cmac(aes)\x00'}}}]}, 0x140}}, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) (async) perf_event_open(&(0x7f0000001680)={0x5, 0x80, 0xee, 0x9, 0x2, 0x1, 0x0, 0x7, 0x100, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000014c0), 0x4}, 0x4a100, 0xac6e000000000000, 0x7f, 0x3, 0x101, 0xffffffff, 0x100, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0xb) (async) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 09:25:48 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1400000000000000) 09:25:48 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa201000000000000) 09:25:48 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8d01000000000000) [ 915.032228] audit: type=1804 audit(1663925148.801:2644): pid=22098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1473/bus" dev="sda1" ino=13914 res=1 09:25:48 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1401000000000000) [ 915.099331] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 915.182250] audit: type=1804 audit(1663925148.861:2645): pid=22109 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/387/bus" dev="sda1" ino=13967 res=1 [ 915.289937] audit: type=1804 audit(1663925149.061:2646): pid=22123 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/387/bus" dev="sda1" ino=13967 res=1 09:25:49 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:49 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa300000000000000) 09:25:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000000020000190000d21325e8c503c284ae03d373a32af900900100000f000000000000000200000006000000f1ff07000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100000000000000190000000004000008000000d2c200001203", 0x75, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[], 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000001c0)={'wg2\x00'}) r2 = socket(0x10, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="5000000024000b0f00"/20, @ANYRES64=r1], 0x50}, 0x1, 0x0, 0x0, 0x48084}, 0x41) recvfrom$unix(0xffffffffffffffff, &(0x7f0000001580)=""/210, 0xd2, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000008c0)={&(0x7f00000000c0)=@newsa={0x140, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in=@remote, 0x0, 0x3c}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@proto={0x5}, @algo_auth={0x48, 0x1, {{'cmac(aes)\x00'}}}]}, 0x140}}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x1) perf_event_open(&(0x7f0000001680)={0x5, 0x80, 0xee, 0x9, 0x2, 0x1, 0x0, 0x7, 0x100, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000014c0), 0x4}, 0x4a100, 0xac6e000000000000, 0x7f, 0x3, 0x101, 0xffffffff, 0x100, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0xb) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001380), 0x0) (async) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f00000002c0)="2000000000020000190000d21325e8c503c284ae03d373a32af900900100000f000000000000000200000006000000f1ff07000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f00000000000000000100000000000000190000000004000008000000d2c200001203", 0x75, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f0000000000000400800000", 0x1f, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[], 0x0) (async) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socket$inet6(0xa, 0x0, 0x0) (async) lsetxattr$security_capability(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400), 0x0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000001c0)={'wg2\x00'}) (async) socket(0x10, 0x0, 0x0) (async) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) (async) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="5000000024000b0f00"/20, @ANYRES64=r1], 0x50}, 0x1, 0x0, 0x0, 0x48084}, 0x41) (async) recvfrom$unix(0xffffffffffffffff, &(0x7f0000001580)=""/210, 0xd2, 0x0, 0x0, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) sendmsg$nl_xfrm(r3, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000008c0)={&(0x7f00000000c0)=@newsa={0x140, 0x10, 0x1, 0x0, 0x0, {{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in=@remote, 0x0, 0x3c}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@proto={0x5}, @algo_auth={0x48, 0x1, {{'cmac(aes)\x00'}}}]}, 0x140}}, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) (async) umount2(&(0x7f0000000180)='./file0\x00', 0x1) (async) perf_event_open(&(0x7f0000001680)={0x5, 0x80, 0xee, 0x9, 0x2, 0x1, 0x0, 0x7, 0x100, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000014c0), 0x4}, 0x4a100, 0xac6e000000000000, 0x7f, 0x3, 0x101, 0xffffffff, 0x100, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x7, 0xffffffffffffffff, 0xb) (async) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) (async) 09:25:49 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1500000000000000) 09:25:49 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8e00000000000000) 09:25:49 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:49 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa301000000000000) 09:25:49 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8e01000000000000) 09:25:49 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1501000000000000) [ 915.709094] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 915.808903] audit: type=1804 audit(1663925149.581:2647): pid=22148 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1474/bus" dev="sda1" ino=15678 res=1 09:25:49 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @rand_addr=' \x01\x00'}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:49 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa400000000000000) [ 915.870704] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:49 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1600000000000000) 09:25:50 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000180)=""/196, 0xc4}, {&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000000)=""/38, 0x26}, {0x0}], 0x4}, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000040)=0xf18003, 0xeefffdef) 09:25:50 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8f00000000000000) 09:25:50 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa401000000000000) 09:25:50 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1601000000000000) 09:25:50 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:50 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:50 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa500000000000000) 09:25:50 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x8f01000000000000) 09:25:50 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1700000000000000) [ 916.647346] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:50 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa501000000000000) 09:25:50 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9000000000000000) 09:25:50 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 917.207620] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:51 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) (async) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000180)=""/196, 0xc4}, {&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000000)=""/38, 0x26}, {0x0}], 0x4}, 0x0) (async, rerun: 64) r0 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) (async, rerun: 64) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) (async, rerun: 64) sendfile(r0, r1, &(0x7f0000000040)=0xf18003, 0xeefffdef) (rerun: 64) 09:25:51 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:51 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa600000000000000) 09:25:51 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1701000000000000) 09:25:51 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9001000000000000) 09:25:51 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 917.597253] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:51 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa601000000000000) 09:25:51 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1800000000000000) 09:25:51 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9100000000000000) 09:25:51 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000180)=""/196, 0xc4}, {&(0x7f00000003c0)=""/111, 0x6f}, {&(0x7f0000000000)=""/38, 0x26}, {0x0}], 0x4}, 0x0) (async) r0 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f0000000040)=0xf18003, 0xeefffdef) 09:25:51 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async, rerun: 64) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) (rerun: 64) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async, rerun: 64) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async, rerun: 64) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:51 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa700000000000000) 09:25:51 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9101000000000000) 09:25:51 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1801000000000000) [ 917.977992] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 918.006845] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:51 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa701000000000000) 09:25:51 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9200000000000000) 09:25:52 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40000000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x200, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:52 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:52 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1900000000000000) 09:25:52 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa800000000000000) 09:25:52 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9201000000000000) [ 918.510464] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:52 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:52 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40000000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x200, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40000000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x200, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:52 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1901000000000000) 09:25:52 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa801000000000000) 09:25:52 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9300000000000000) [ 918.759981] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:52 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40000000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x200, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40000000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x200, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:52 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1a00000000000000) 09:25:52 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9301000000000000) [ 919.228349] kauditd_printk_skb: 22 callbacks suppressed [ 919.228364] audit: type=1804 audit(1663925153.002:2670): pid=22333 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1905/bus" dev="sda1" ino=15858 res=1 [ 919.297973] audit: type=1804 audit(1663925153.052:2671): pid=22374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1481/bus" dev="sda1" ino=15826 res=1 09:25:53 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:53 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1a01000000000000) 09:25:53 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa900000000000000) 09:25:53 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9400000000000000) [ 919.340771] net_ratelimit: 1 callbacks suppressed [ 919.340782] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 919.375586] audit: type=1804 audit(1663925153.152:2672): pid=22370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1481/bus" dev="sda1" ino=15826 res=1 [ 919.554863] audit: type=1804 audit(1663925153.322:2673): pid=22401 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/393/bus" dev="sda1" ino=15680 res=1 [ 919.592239] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 919.860799] audit: type=1804 audit(1663925153.632:2674): pid=22393 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1905/bus" dev="sda1" ino=15858 res=1 [ 919.914532] audit: type=1804 audit(1663925153.682:2675): pid=22408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/393/bus" dev="sda1" ino=15680 res=1 09:25:54 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1b00000000000000) 09:25:54 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xa) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:54 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa901000000000000) 09:25:54 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9401000000000000) 09:25:54 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:54 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r4 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) 09:25:54 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9500000000000000) 09:25:54 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1b01000000000000) 09:25:54 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xaa00000000000000) [ 920.589578] xt_CT: You must specify a L4 protocol and not use inversions on it [ 920.615895] block nbd4: shutting down sockets [ 920.630168] audit: type=1804 audit(1663925154.402:2676): pid=22436 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1482/bus" dev="sda1" ino=16182 res=1 09:25:54 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r4 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async) syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) (async) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) accept4(r3, 0x0, 0x0, 0x0) (async) sendto$inet(r4, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) (async) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) (async) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) (async) 09:25:54 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async, rerun: 32) r1 = getpgid(0x0) (rerun: 32) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xa) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async, rerun: 32) faccessat(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) sendfile(r5, r3, 0x0, 0x800100020046) (async, rerun: 32) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async, rerun: 32) creat(&(0x7f0000000080)='./bus\x00', 0x0) (rerun: 32) [ 920.681065] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:54 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9501000000000000) [ 920.801641] audit: type=1804 audit(1663925154.432:2677): pid=22437 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/394/bus" dev="sda1" ino=16187 res=1 09:25:54 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xaa01000000000000) 09:25:54 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1c00000000000000) [ 921.008508] audit: type=1804 audit(1663925154.782:2678): pid=22454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1483/bus" dev="sda1" ino=16190 res=1 [ 921.033815] xt_CT: You must specify a L4 protocol and not use inversions on it 09:25:54 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9600000000000000) [ 921.117437] block nbd4: shutting down sockets 09:25:54 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xab00000000000000) [ 921.281532] audit: type=1804 audit(1663925154.852:2679): pid=22445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/394/bus" dev="sda1" ino=16187 res=1 09:25:55 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:55 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1c01000000000000) 09:25:55 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) (async) r2 = syz_open_dev$ndb(&(0x7f0000000100), 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) r4 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) (async) ioctl$NBD_SET_SOCK(r0, 0xab00, r4) (async) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) 09:25:55 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xa) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0xa) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(0xffffffffffffffff, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:55 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xab01000000000000) 09:25:55 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9601000000000000) 09:25:55 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1d00000000000000) 09:25:55 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xac00000000000000) 09:25:55 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9700000000000000) 09:25:55 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1d01000000000000) 09:25:55 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xac01000000000000) [ 921.603663] block nbd4: Device being setup by another task [ 921.609446] xt_CT: You must specify a L4 protocol and not use inversions on it [ 921.637239] block nbd4: shutting down sockets 09:25:55 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 921.693284] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:55 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:55 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:55 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1e00000000000000) 09:25:55 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9701000000000000) 09:25:55 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xad00000000000000) 09:25:56 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xad01000000000000) 09:25:56 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9800000000000000) [ 922.435489] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 922.467436] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:56 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1e01000000000000) 09:25:56 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xae00000000000000) 09:25:56 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xae01000000000000) 09:25:56 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9801000000000000) 09:25:57 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:57 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1f00000000000000) 09:25:57 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xaf00000000000000) 09:25:57 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:25:57 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:57 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9900000000000000) 09:25:57 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x1f01000000000000) [ 923.460150] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:57 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xaf01000000000000) 09:25:57 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9901000000000000) [ 923.616387] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:57 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2000000000000000) 09:25:57 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb000000000000000) 09:25:57 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9a00000000000000) [ 924.415694] kauditd_printk_skb: 15 callbacks suppressed [ 924.415709] audit: type=1804 audit(1663925158.192:2695): pid=22641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1910/bus" dev="sda1" ino=16233 res=1 09:25:58 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:58 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2001000000000000) 09:25:58 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:58 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb001000000000000) 09:25:58 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async, rerun: 64) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (rerun: 64) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async, rerun: 64) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:58 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9a01000000000000) 09:25:58 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2100000000000000) 09:25:58 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9b00000000000000) 09:25:58 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb100000000000000) [ 924.794944] audit: type=1804 audit(1663925158.562:2696): pid=22671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/398/bus" dev="sda1" ino=16245 res=1 [ 924.813069] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:25:58 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2101000000000000) [ 924.873064] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 925.058341] audit: type=1804 audit(1663925158.612:2697): pid=22673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1487/bus" dev="sda1" ino=16187 res=1 09:25:58 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb101000000000000) 09:25:58 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2200000000000000) [ 925.309555] audit: type=1804 audit(1663925158.632:2698): pid=22673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1487/bus" dev="sda1" ino=16187 res=1 [ 925.344761] audit: type=1804 audit(1663925158.632:2699): pid=22673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1487/bus" dev="sda1" ino=16187 res=1 [ 925.441581] audit: type=1804 audit(1663925158.632:2700): pid=22673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1487/bus" dev="sda1" ino=16187 res=1 [ 925.469583] audit: type=1804 audit(1663925158.632:2701): pid=22673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1487/bus" dev="sda1" ino=16187 res=1 [ 925.498435] audit: type=1804 audit(1663925158.662:2702): pid=22673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1487/bus" dev="sda1" ino=16187 res=1 [ 925.549550] audit: type=1804 audit(1663925158.662:2703): pid=22673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1487/bus" dev="sda1" ino=16187 res=1 [ 925.576528] audit: type=1804 audit(1663925158.662:2704): pid=22673 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1487/bus" dev="sda1" ino=16187 res=1 09:25:59 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:59 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9b01000000000000) 09:25:59 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb200000000000000) 09:25:59 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:59 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2201000000000000) 09:25:59 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x25) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:25:59 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb201000000000000) 09:25:59 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2300000000000000) 09:25:59 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9c00000000000000) 09:26:00 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb300000000000000) 09:26:00 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2301000000000000) [ 926.208028] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:00 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9c01000000000000) [ 926.296952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:00 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6d) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) bind(0xffffffffffffffff, &(0x7f0000000080)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) socket$alg(0x26, 0x5, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696c6540001c4c922ec4c9be9963aa450000"]) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000002c0)={0x19b, 0x0, 0x401, 0x3, 0x7}, 0x14) creat(&(0x7f00000001c0)='./file0\x00', 0x52) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 09:26:00 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb301000000000000) 09:26:00 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2400000000000000) 09:26:00 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9d00000000000000) 09:26:00 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x25) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r4, r2, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:00 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:00 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9d01000000000000) 09:26:00 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb400000000000000) 09:26:00 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2401000000000000) 09:26:01 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb401000000000000) [ 927.229767] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:01 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r1, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x25) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r1, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x25) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r4, r2, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:26:01 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9e00000000000000) [ 927.325354] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:01 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='vcan0\x00', 0x10) (async) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6d) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) (async, rerun: 64) bind(0xffffffffffffffff, &(0x7f0000000080)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) (async, rerun: 64) socket$alg(0x26, 0x5, 0x0) getpid() (async) sched_setscheduler(0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696c6540001c4c922ec4c9be9963aa450000"]) (async) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000002c0)={0x19b, 0x0, 0x401, 0x3, 0x7}, 0x14) (async, rerun: 64) creat(&(0x7f00000001c0)='./file0\x00', 0x52) (async, rerun: 64) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) (async, rerun: 64) write$binfmt_misc(r2, &(0x7f0000000300)=ANY=[], 0xff01) (rerun: 64) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 09:26:01 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2500000000000000) 09:26:01 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb500000000000000) [ 927.423736] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:01 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2501000000000000) 09:26:01 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9e01000000000000) 09:26:01 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:01 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb501000000000000) 09:26:01 executing program 4: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) (async) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) (async) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040)={0x0, 0x2710}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='vcan0\x00', 0x10) (async) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6d) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x81, 0x1210}, 0x14) (async) bind(0xffffffffffffffff, &(0x7f0000000080)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) (async) socket$alg(0x26, 0x5, 0x0) (async, rerun: 64) getpid() (rerun: 64) sched_setscheduler(0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000000", @ANYRES32=r0, @ANYBLOB="00000000000000002e2f66696c6540001c4c922ec4c9be9963aa450000"]) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000002c0)={0x19b, 0x0, 0x401, 0x3, 0x7}, 0x14) (async, rerun: 32) creat(&(0x7f00000001c0)='./file0\x00', 0x52) (async, rerun: 32) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000300)=ANY=[], 0xff01) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 09:26:01 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000200)='./file0\x00', 0x442081, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:01 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2600000000000000) 09:26:01 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9f00000000000000) 09:26:01 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb600000000000000) [ 927.721696] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:01 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x9f01000000000000) 09:26:01 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2601000000000000) 09:26:01 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb601000000000000) [ 927.807249] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:01 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb700000000000000) 09:26:01 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa000000000000000) 09:26:02 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2c80, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000980), 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xa, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x103) recvmsg(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001780)=""/218, 0xda}, {&(0x7f00000014c0)=""/169, 0xa9}, {&(0x7f00000015c0)=""/234, 0xea}], 0x3, &(0x7f00000016c0)=""/90, 0x5a}, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/igmp\x00') preadv(r3, &(0x7f0000000140)=[{&(0x7f0000000180)=""/4100, 0x1004}], 0x1, 0x25000000, 0x0) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e030a86df875f2e3ff5f163ee340b7679500800000000000000101013c5811039e0c775027ec8e66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5acc326d3a0dffc2c654"}, 0x80) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000000180)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b93e480541ba3860ac5cf65ac618ded8974895abeaf4b4835ef922b3f1e0b02bd60da03059bcecc7a95425a3a07e758044ab4ea6f7ae56d88fecf93e1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001740), 0x103080, 0x0) perf_event_open(&(0x7f0000001200)={0x3, 0x80, 0x1, 0x40, 0x6, 0x0, 0x0, 0x5, 0x80204, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000011c0), 0x3}, 0x2, 0xfffffffffffff94d, 0x7, 0x2, 0x0, 0x140e, 0x1, 0x0, 0x8, 0x0, 0x2}, r2, 0x7, r4, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000001340)="dfeb9c4ab48c93c51a1a39a8a314bc0359a3573a8b96dceb135cc2089360254cda8b32139c82891dab2deffcacfb9d98d93f23ef1ddbcf644b73ba0a648e44a68caa7f7b558374fcae971c55a7454026fdafd5d8381a9abdfb6fba2fc98bdbe80dd41644e6088b08a27b18c27efc6673aef60c9b5ab12657", 0x78, 0x0, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 09:26:02 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa001000000000000) 09:26:02 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000200)='./file0\x00', 0x442081, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000200)='./file0\x00', 0x442081, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:26:02 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2700000000000000) 09:26:02 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb701000000000000) 09:26:02 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa100000000000000) 09:26:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) (async) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) (async) r1 = socket(0x11, 0x800000003, 0x8) (async) r2 = getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2c80, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000980), 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xa, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x103) (async) recvmsg(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001780)=""/218, 0xda}, {&(0x7f00000014c0)=""/169, 0xa9}, {&(0x7f00000015c0)=""/234, 0xea}], 0x3, &(0x7f00000016c0)=""/90, 0x5a}, 0x0) (async) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/igmp\x00') preadv(r3, &(0x7f0000000140)=[{&(0x7f0000000180)=""/4100, 0x1004}], 0x1, 0x25000000, 0x0) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e030a86df875f2e3ff5f163ee340b7679500800000000000000101013c5811039e0c775027ec8e66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5acc326d3a0dffc2c654"}, 0x80) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) (async) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000000180)={0x2, 0x4e23, @empty}, 0x10) (async) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) (async) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b93e480541ba3860ac5cf65ac618ded8974895abeaf4b4835ef922b3f1e0b02bd60da03059bcecc7a95425a3a07e758044ab4ea6f7ae56d88fecf93e1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) (async) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001740), 0x103080, 0x0) perf_event_open(&(0x7f0000001200)={0x3, 0x80, 0x1, 0x40, 0x6, 0x0, 0x0, 0x5, 0x80204, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000011c0), 0x3}, 0x2, 0xfffffffffffff94d, 0x7, 0x2, 0x0, 0x140e, 0x1, 0x0, 0x8, 0x0, 0x2}, r2, 0x7, r4, 0x4) (async) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000001340)="dfeb9c4ab48c93c51a1a39a8a314bc0359a3573a8b96dceb135cc2089360254cda8b32139c82891dab2deffcacfb9d98d93f23ef1ddbcf644b73ba0a648e44a68caa7f7b558374fcae971c55a7454026fdafd5d8381a9abdfb6fba2fc98bdbe80dd41644e6088b08a27b18c27efc6673aef60c9b5ab12657", 0x78, 0x0, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 928.472160] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:02 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb800000000000000) 09:26:02 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa101000000000000) 09:26:02 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2701000000000000) 09:26:02 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:02 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2800000000000000) 09:26:02 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb801000000000000) 09:26:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$inet(0x2, 0x4000000000000001, 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) (async) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) r1 = socket(0x11, 0x800000003, 0x8) (async) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2c80, 0xd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000980), 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xa, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040), 0xd3, 0x103) (async) recvmsg(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001780)=""/218, 0xda}, {&(0x7f00000014c0)=""/169, 0xa9}, {&(0x7f00000015c0)=""/234, 0xea}], 0x3, &(0x7f00000016c0)=""/90, 0x5a}, 0x0) (async) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/igmp\x00') preadv(r3, &(0x7f0000000140)=[{&(0x7f0000000180)=""/4100, 0x1004}], 0x1, 0x25000000, 0x0) (async) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e030a86df875f2e3ff5f163ee340b7679500800000000000000101013c5811039e0c775027ec8e66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5acc326d3a0dffc2c654"}, 0x80) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) (async) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000000180)={0x2, 0x4e23, @empty}, 0x10) (async) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b93e480541ba3860ac5cf65ac618ded8974895abeaf4b4835ef922b3f1e0b02bd60da03059bcecc7a95425a3a07e758044ab4ea6f7ae56d88fecf93e1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) (async) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001740), 0x103080, 0x0) perf_event_open(&(0x7f0000001200)={0x3, 0x80, 0x1, 0x40, 0x6, 0x0, 0x0, 0x5, 0x80204, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000011c0), 0x3}, 0x2, 0xfffffffffffff94d, 0x7, 0x2, 0x0, 0x140e, 0x1, 0x0, 0x8, 0x0, 0x2}, r2, 0x7, r4, 0x4) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) sendto$inet(0xffffffffffffffff, &(0x7f0000001340)="dfeb9c4ab48c93c51a1a39a8a314bc0359a3573a8b96dceb135cc2089360254cda8b32139c82891dab2deffcacfb9d98d93f23ef1ddbcf644b73ba0a648e44a68caa7f7b558374fcae971c55a7454026fdafd5d8381a9abdfb6fba2fc98bdbe80dd41644e6088b08a27b18c27efc6673aef60c9b5ab12657", 0x78, 0x0, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 09:26:02 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000200)='./file0\x00', 0x442081, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:02 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa200000000000000) 09:26:02 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb900000000000000) 09:26:02 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2801000000000000) 09:26:02 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) keyctl$instantiate(0xc, 0x0, &(0x7f0000000540)=ANY=[@ANYRES16=r0, @ANYRESOCT=r0], 0x2a, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$chown(0x4, 0x0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, 0x0, 0x4002410) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x6, 0x6, 0x0) keyctl$unlink(0x9, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000140)='user\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="477d4368319d11b38a7d790119dd99f436bf85252aad5dba5a5566c9", 0x1c, 0x0) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='+\x88\x00', 0x0) add_key$user(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000001340)="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", 0x1000, 0xfffffffffffffff8) keyctl$get_security(0x11, r2, &(0x7f0000000500)=""/31, 0x1f) r4 = add_key$user(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="633c89fad2cd26e56456644821e43ed4362708b1b87618f1505962bff902a2da500eda9bdf99af441abcb6f11472e07abe95fcf23b7d5652d0bfbfc12a1569f6932deacafa4937677ed548b961b2802b30043172473b0476efd589862bdaefc4fa020e4a2c30a1f8e85468eabf984302d94765863880bbe554c2eef25b3a3f0e26de5fd1f8a771f4b3f5017ed7e5116aa5a0799cf309f28fee92e7b622da7014cacceeeb29e47e6c6493160da477a1068cd67decbbee951ff1f9d1d10c62503911fffb902eb7bc71988fd4cfb53fdacfbd05e2497a2fb2cda61e9e747fb277cfede76ecda0b23b675594b8d795", 0xed, r3) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$user(&(0x7f00000001c0), &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0x0, r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) keyctl$search(0xa, r4, &(0x7f0000000100)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x3}, r3) 09:26:02 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb901000000000000) 09:26:03 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2900000000000000) 09:26:03 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa201000000000000) 09:26:03 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:03 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xba00000000000000) 09:26:03 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa300000000000000) 09:26:03 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0xab) sendfile(r5, r3, 0x0, 0x5) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:03 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2901000000000000) [ 929.521847] encrypted_key: insufficient parameters specified 09:26:03 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa301000000000000) 09:26:03 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) keyctl$instantiate(0xc, 0x0, &(0x7f0000000540)=ANY=[@ANYRES16=r0, @ANYRESOCT=r0], 0x2a, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$chown(0x4, 0x0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, 0x0, 0x4002410) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x6, 0x6, 0x0) keyctl$unlink(0x9, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000140)='user\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="477d4368319d11b38a7d790119dd99f436bf85252aad5dba5a5566c9", 0x1c, 0x0) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='+\x88\x00', 0x0) add_key$user(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000001340)="930604a1f266c34c401a011aa06887548adddac5eb402ab4a8231d02e0d8d43cecfbc30a370c129d265aa0802a70f5092cee50b9eaffdfb65d11451e1368544c820755545dfabedde747f6f73e68fafdb64d64f8fcae186af1d18d6c9915f04e0b11b049380e39b2d5569d1c867cb02e841da33f1aa35654b6a1991b6737a5be20c30ef701c050ac4dfdd46a8fdbe29ecdb8945dec3a56fe76d1e1ee77c82c2ba80a29d3771e585d278078738b30e69ff84adebbc33d13e87053598c75268dda5b5e99efb7a03c008799cb15e0a4ba2ccd48d0a79c781b35036c62b37a50cafabbaf711bb9c7140cdd23c26a261c1cffaa72ca6f1095906350235d444e4437f743798199d7df40383733c0dd02d78e08660fbd8f18dfcaffd53becce4086cdddb8d2ffbf04c07751bd59dc941bd2282e9eabf4c6ad125d2078c1393a2f6f8ab2c01e02c39a64be74b34f4dc2756538130b44326bbe538eebc8b1423f2ea6e6d0456faf167927de1d9c6318c9710f05c6d7923c8b39fc083bc11f83cdbe7f6504966fdd3c821d7d9eb93dda19d64c8b68ac131f48360fe72e0c1ef67bdc838fd89f4b8f7a6f57dff67712c4eae007b7be125f2c03448ce8254b12a95cf1f89479b606ee555dc9c9e9665c0f4721941787ac2c6bfc40f0b23bfb17c883d1523c4a019cfd0f826b3620174de7926548f6e9982f2e239288b5fc7baac474a68d71b0b88208294da50cd71969d47450ed8f64acd78501bd9410ee86a91c63c67e10ad72e3e16ba2e97618883fcba8708e9d72c18325c183e89da0536f8ee4eb57fc0991ee0cfe123b3d81289761003a43c72a6cdc952323bd2c9d90352919a21166cc1a10e524d181a0ce05c9cce3a8b5fb71ae20359a57a3dc8641ba66f9a1464bf1c19b9d74974c992e95619fad3eb48991f3e729c83c61d3daafff5bed822a990d7001687c43f4edce76021535e3d781452503448c2888c2d0c8057f5dffd056c2cfc3a965117d3fbd7ce92f30d9a12619975a4509f8b41e808bff77767ec753384aba246cbd909d0039cf82575eb3f0090296faea49d96aacf1f83b5f5a91739ef4c203a642ebe6dc7df31e50a58d2d6afa963ecc66618e7d2b72f5499bddc7ebc346c73ca2f995978751befd0781abddf6428b7ee4bd1e7a85ebf345f83b895921329ede8898f57ac416d9b4010856a77c5b5d1c94a29f8ea486dbb044713b0aa3ee756d0363f564d051132bf1301acddbd8a0fd039b80760af2980d697593b443addf395acef59ae01d4e82cbc974e99db6614a86f56d11f0cf9bcf1cc86649aff5aac32cfad68729fcc2d053ba3ea551a26c26d0d1e0b67fb84244dccaa7c7b5d41abeb407a55f34e1cff06d04962e540c4ee2621ab800ddffb7eeb03ea6bd887596c7267653d8bd65194ec3092fff4b6a025a7ca4bfa91e304b5edbed8b90559210694129d0e2bfb6e21c66115086fe21c647332a1132ef27500f483907e470e9ec9c96304af4da3ab917deb26474182e42072d553590af50d58f4f44cbad79f4520eea1ade36c76d7d588dee252289505631673e947025888b804272b80f2a8485abc2a179b8f878fb2c9dd4d6e7e229f0320213527b0dedb4d9aa01de8cb1bd4342e77ab309b5d59a099b07e85537696e6222f76f49096e013ad9c8d306d8aab57385c47696a951cfd512e4f3d3254519cd80599867bc531664e2ba8758b537c63ea770a0e57f4b9cebfad73b56e7ea6f7261908ee7199bda7036b9f658c9f180e62ffc494d617dadf5a239d099a4b13dd229fa5003d719529b795c17a001b3e7464f6a7236ac34662f355d33b1949a1e39f104f998e83e14e2edbcd42049a786d8c472e88d1c1e5729b16f529e3eb5f2e551b4b1d5f452b038de31eaaf2e3c9aff98ca556f6032a83443404ecd4473de9ce754c7d02e03ccd8ea008d19e48df6981d4e1a116343d8300d70ddb3a56850ec0c501ea42aedc2960965bf992da966932c97aadacdccebbc5a56ded4cf3d3b270005f539f4a91a924424610988d647f7fb1772335fe3230242306f4f6236c74a1625531a1c840214474def97c19bb21c3176be69b9d07f0794fc8762305534cad928e6aad7185805618d8b7f03c624c941562a6e04671da639aaa3940f2a3c07db9c0e391dfd4ccabe09837f8f4f756acd0081790099e9a656b80169426ed9b7172f20f1efef7842f9dd24e886ae58d24097632d7ab72f81e784ea292c9889e8f27d72c68dd30c0868582ddb14d57d185ba48c6e3a0da073420e313619319616a35774749fab918421cfd0a45f54dd20c5b7368686111f33ea3a868b3aaad42ac32e800a39b453216a14544d9c9105e71c5745f8dfe405a1486ed9d8c76fb093e862275a2aa35b3a01250358c8224b2542de3bbda67201a8806946ea59de07af358f8897bbeb636575fb3f99d4e7e289eb8fdd4b9317b19fe81e35d1c0b1ceb52f84f2cc566da929097389392074981c458d319c7f7121f40c49e2c3e8722946c1b09f33dd06a2f76e0db07b3ec59ec2cb5233b78becd35faeb1dca8c5a81df5c365683dcd16fecb60dd11b6a009ac8128b715a03d8bda721934330bd3f521ba62ce7e7cc95427653bdddcb31bad7fb9e53ccad4433ac9af4138f1d18d52a7a713aba864888da91ad05aaf33ea0177e681158e21a905dac6e15580643e7d8ece24be501fc59af40defbe5ad032c083999dabbc9c2891dd0590bdb393038f77579bce2c3a4a901de4d3331d0814626f485e3ed1888cd2d79f7b4ff348cca7be327a09ae6ac0734aeca80d822b77507724fd50a1ecdb941b70d553afe50225d3eeda0a34083956adba05a8b7627a2744fb4cda5ebf98412a047fe74859765b9c98213ac625459a0366196d536b99306a245d33e4ff170009e528de5d13b2060fb4e71f6c4f3c8d001bac9e489e4478c54e6c82ce210d4c1e93c8e740420cd5d486a90f62ecb896903b00a5b437d2f7be62108d3d82e4e6fb6110de72ecde57b45a56f376e8d1900487b9c5b8812102bc75a89425a8fe7133ffd2d1c4f1a1c4b98f15a1077d102247d4a4053d0713964fce6587eccad6f41cdb91dae88768bca976160f7249703599465dbd98c76881a8d2fb283d6748eb045ff3046a3739ab7912a0d3b371331d56f96e4bf3529da9c783eab18f357ce0a634262f98bcd54c7b3a537d5adaa02eb586852aa04c77080cf045200314ec3ef7f629df807fd22bbb2d5d74358862f47c2b2a8340107bc281df775df76d97474284cf5f58ac4aa0dfa0b4e5cba0ea7a657ee1677831fa9490fb44c46aff67ed2de939e170094f122df5d25e4e258fb7762706512160b6a5f21913dbace15eda8a9d85e3689caafc3d7f13b0c11a8986de6a6fc15ab1b27c197fad89aa01d4a4efb339966d7d2a3ef880da10d2f2befc3d94dde38864fb4e45e1472a414408eb956108d81010fc3450b29de303b51ffe5958b96e8e0434e7758fb2e1e4b68339e5db7e4f8f251a1028bb7da38cc5f5f105d4baa2385538b191fa282ef45c760ee4374eefb032d02b78ec413ad055d070ed95f381ffcb7d58e518e60f1a836b7e33464338bda4dbee5fa8bf725b4ea40a23ca2a46e794e14174196c2ffcc15b3a93f77a1dcb0db839f5fbe826c8b8e0e233eb92528ad0fdc1c5ddf156d1a63406eb3bd1904d7b56ce836a0578cca35515a83392f044ea30940d79d0311ee667b9bcf50f4eaa98bb533d1354da00f27c6240a30ad84e01cc15209bb3f8b0d81a926c0648ccd40cb7c131009f19d9e68fd5bf9c518234b1f6ef8d6402a932e03fdd8f057c1d25953ad0d5eff1a917fadb98279507bc10e307bb976140da66e79c1a6069362b5a6c5be942cb8228c9b64688c19ea037d0b128d685d04fa24c8a3729f1d8a57e94da19f141a79b2fab057fbee2893d8bf6c3c81ffadd732e04a749ed4c7e70dc09688727cefb2858598ab905c49004db00252583c05bd0fcdaa339a86a16cf957e213f5b5414ed1fa030dfb23301436e6f68b77fbcdfac785c449886175a1b2b0f601c78fc195a4c3172d4ea8c706572ddc48363bfc88b098db9e24d0cd112126f1616ebc16aee05ba80dae3e4e679505f255a3d32b5714b479839bee61003638599a2acb5d5817e989b537f104d6ec0fdcea147bd75c5091941d3bdbff97ec18b84c423e560c250cec197b50495579d7edc3a2ce9e8ca9d8a75d46535ac797059bbdf453bab1201f4f06e7b84cf2b90dd0ce97569ef552c2a9e5a363bfa350eb5faef20565fe121950a8674bdcfbb2ee38f285fd388d2dd74b4f11420ea614e9cf3f819d297c177e424a5a34506edfee03e50fdb681dd0c0eddc49ee043e094011a364e3f3dff5dc1cf953f7c24b808eab6d2d1557d43e17c163ec3ea81f0f3a13f932f6cfe197dcd2cb5861c0bdb1af68db90191e22875cf9cf00830d0a82316b8b2e30b7e3be65731c406183718f9a751588a052d99ebc615bb6edb5f03445d175e50381adb3903287b6daa79628e33825a6789a62b5324cda23ebbe2debb3c549d24b2c2ed91ad6f567cf051e9c2acbc18d19db591e037367a54ab13e401363a2f78403ec3cb8f07d714094084c87126d000e0efa3c3da0e82da82cd9bff9d94ce1a7608092e13ba741ad38d7c69c0abea7c8458091302d4e8167a39ede1c31d5ffd4ec431e9d74f4d18aa27a77231a3ae907b1272285f803f050d7b32486b3c2793c939aaa6c25565853d817ab04529f0bb1f8fe04be7f8f9861722a24de204a81378f1acefe7fbd4204d270de6b7695f8e0ddf2c1e24171a02058ce7e5837eb588fdb93a820088a2b49934aba9493c3c733edb7b158991d92e1ce8cc961ae7acad9ff24d391ba5c8ee6f1fce73ad14971b2fe593387e9caf92c7c5a472ee4ffb5681e4f25cc5f9b72fae2155bb80c0b75dec3dcc7b4b90bc634d026459d9c3a8da3c8cba4b61121a5f3a246344279077622db2890b64c9c5be240ca3096114d286d5626d3b5e2d8e9328f08e99ce3edc8b8f3b11226fe7773314514f08ee84cfd0dc47a9d8d49989ecacd1d76bbdfd4a49e61961bc5facb582c42397012e10e9ea3b8e146618cdfbc3d5380c0f5555b190831e65d5451d8ba17f728f2fab344a471b00b075566e6db655d35185dd0b637b9b4acf21a3d810f50baf75a9dab0833225ce561043c9bb5f08f28bc723d47b6b0adbc6495fc42682f779c8adc37f8a7cb03e383ce41ed05652d5f0b74dedb8022ae3d4c9505969b26f60136fb341440319496260643423cb9da3e09affa8518d39aa59c2f9b501e7ff57446b7333a3c2dc272423ac0f96d59a65fc0cab324eae07d67781611c80f5be3e69c15c86e1b07d09ec8d33df367037879bd68cbc7c5b2d01b69209006c497606accaed6b628e4e7dcdbf92c6636885fd13fbc406556c856d27e10e4eed350090d30da5ed758b88aae5f1c337c0bec348ec0927fe10cad9de51ee759ba87e917037aaa4236f27988c4d798fb9385e2ffcdc4fdb96b1cea02413b24a3e84e8f043b514a33d08b23fcd34a671f0f0bb1cb321a64d8940ff4597f7b59182cfc8db3b3af6034a6744a4b481899ec54a6404722a0dd7b43aa90b918a2035dda5e879f522d2bbf50131f4d7d2bcc5257ab6d97c47cad913cf51e3466887787e36285885886319b5314e46742c594b9b6a9b1bab008ea8b0a6e29e573daeb4863db2bd66fb16f358dfeda055109227290af0148cb216d5f3a1109510416a2ae372fe35dcfa8a258813fd40205e7b8cc02f1b6acbc12c8aa5", 0x1000, 0xfffffffffffffff8) keyctl$get_security(0x11, r2, &(0x7f0000000500)=""/31, 0x1f) r4 = add_key$user(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="633c89fad2cd26e56456644821e43ed4362708b1b87618f1505962bff902a2da500eda9bdf99af441abcb6f11472e07abe95fcf23b7d5652d0bfbfc12a1569f6932deacafa4937677ed548b961b2802b30043172473b0476efd589862bdaefc4fa020e4a2c30a1f8e85468eabf984302d94765863880bbe554c2eef25b3a3f0e26de5fd1f8a771f4b3f5017ed7e5116aa5a0799cf309f28fee92e7b622da7014cacceeeb29e47e6c6493160da477a1068cd67decbbee951ff1f9d1d10c62503911fffb902eb7bc71988fd4cfb53fdacfbd05e2497a2fb2cda61e9e747fb277cfede76ecda0b23b675594b8d795", 0xed, r3) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) add_key$user(&(0x7f00000001c0), &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0x0, r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) keyctl$search(0xa, r4, &(0x7f0000000100)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x3}, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) (async) keyctl$instantiate(0xc, 0x0, &(0x7f0000000540)=ANY=[@ANYRES16=r0, @ANYRESOCT=r0], 0x2a, 0x0) (async) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) (async) add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) (async) add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) keyctl$chown(0x4, 0x0, 0xee00, 0xffffffffffffffff) (async) keyctl$setperm(0x5, 0x0, 0x4002410) (async) keyctl$chown(0x4, 0x0, 0x0, 0x0) (async) keyctl$reject(0x13, 0x0, 0x6, 0x6, 0x0) (async) keyctl$unlink(0x9, 0x0, 0x0) (async) keyctl$search(0xa, 0x0, &(0x7f0000000140)='user\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0) (async) add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="477d4368319d11b38a7d790119dd99f436bf85252aad5dba5a5566c9", 0x1c, 0x0) (async) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='+\x88\x00', 0x0) (async) add_key$user(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000001340)="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", 0x1000, 0xfffffffffffffff8) (async) keyctl$get_security(0x11, r2, &(0x7f0000000500)=""/31, 0x1f) (async) add_key$user(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="633c89fad2cd26e56456644821e43ed4362708b1b87618f1505962bff902a2da500eda9bdf99af441abcb6f11472e07abe95fcf23b7d5652d0bfbfc12a1569f6932deacafa4937677ed548b961b2802b30043172473b0476efd589862bdaefc4fa020e4a2c30a1f8e85468eabf984302d94765863880bbe554c2eef25b3a3f0e26de5fd1f8a771f4b3f5017ed7e5116aa5a0799cf309f28fee92e7b622da7014cacceeeb29e47e6c6493160da477a1068cd67decbbee951ff1f9d1d10c62503911fffb902eb7bc71988fd4cfb53fdacfbd05e2497a2fb2cda61e9e747fb277cfede76ecda0b23b675594b8d795", 0xed, r3) (async) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) (async) add_key$user(&(0x7f00000001c0), &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0x0, r1) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) (async) keyctl$search(0xa, r4, &(0x7f0000000100)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x3}, r3) (async) 09:26:03 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xba01000000000000) 09:26:03 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2a00000000000000) 09:26:03 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa400000000000000) [ 929.687684] kauditd_printk_skb: 83 callbacks suppressed [ 929.687698] audit: type=1804 audit(1663925163.462:2789): pid=22998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/404/bus" dev="sda1" ino=14689 res=1 09:26:03 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2a01000000000000) 09:26:03 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbb00000000000000) [ 929.747647] encrypted_key: insufficient parameters specified [ 929.977575] audit: type=1804 audit(1663925163.462:2788): pid=22997 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1494/bus" dev="sda1" ino=14257 res=1 [ 930.067865] audit: type=1804 audit(1663925163.652:2790): pid=22997 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1494/bus" dev="sda1" ino=14257 res=1 [ 930.091596] audit: type=1804 audit(1663925163.812:2791): pid=22998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/404/bus" dev="sda1" ino=14689 res=1 09:26:04 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbb01000000000000) 09:26:04 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa401000000000000) 09:26:04 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2b00000000000000) 09:26:04 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000010000c50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) keyctl$instantiate(0xc, 0x0, &(0x7f0000000540)=ANY=[@ANYRES16=r0, @ANYRESOCT=r0], 0x2a, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000040), &(0x7f0000000000), &(0x7f0000001300)="d2", 0x1, 0xfffffffffffffffe) (async) r3 = add_key$keyring(&(0x7f0000000480), &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, r1) (async) keyctl$chown(0x4, 0x0, 0xee00, 0xffffffffffffffff) (async) keyctl$setperm(0x5, 0x0, 0x4002410) keyctl$chown(0x4, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x6, 0x6, 0x0) keyctl$unlink(0x9, 0x0, 0x0) (async) keyctl$search(0xa, 0x0, &(0x7f0000000140)='user\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0) add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="477d4368319d11b38a7d790119dd99f436bf85252aad5dba5a5566c9", 0x1c, 0x0) request_key(&(0x7f0000000640)='blacklist\x00', &(0x7f0000000680)={'syz', 0x0}, &(0x7f00000006c0)='+\x88\x00', 0x0) (async) add_key$user(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000001340)="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", 0x1000, 0xfffffffffffffff8) (async, rerun: 64) keyctl$get_security(0x11, r2, &(0x7f0000000500)=""/31, 0x1f) (async, rerun: 64) r4 = add_key$user(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="633c89fad2cd26e56456644821e43ed4362708b1b87618f1505962bff902a2da500eda9bdf99af441abcb6f11472e07abe95fcf23b7d5652d0bfbfc12a1569f6932deacafa4937677ed548b961b2802b30043172473b0476efd589862bdaefc4fa020e4a2c30a1f8e85468eabf984302d94765863880bbe554c2eef25b3a3f0e26de5fd1f8a771f4b3f5017ed7e5116aa5a0799cf309f28fee92e7b622da7014cacceeeb29e47e6c6493160da477a1068cd67decbbee951ff1f9d1d10c62503911fffb902eb7bc71988fd4cfb53fdacfbd05e2497a2fb2cda61e9e747fb277cfede76ecda0b23b675594b8d795", 0xed, r3) (async) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) (async) add_key$user(&(0x7f00000001c0), &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300), 0x0, r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) (async) keyctl$search(0xa, r4, &(0x7f0000000100)='id_resolver\x00', &(0x7f0000000580)={'syz', 0x3}, r3) 09:26:04 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (rerun: 64) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async, rerun: 64) faccessat(0xffffffffffffffff, 0x0, 0xab) (async, rerun: 64) sendfile(r5, r3, 0x0, 0x5) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:04 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:04 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa500000000000000) 09:26:04 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbc00000000000000) [ 930.342175] encrypted_key: insufficient parameters specified 09:26:04 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2b01000000000000) 09:26:04 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0xab) sendfile(r5, r3, 0x0, 0x5) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 930.412131] audit: type=1804 audit(1663925164.182:2792): pid=23060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1495/bus" dev="sda1" ino=15027 res=1 09:26:04 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa501000000000000) 09:26:04 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbc01000000000000) [ 930.499617] net_ratelimit: 5 callbacks suppressed [ 930.499644] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:04 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2c00000000000000) [ 930.596083] audit: type=1804 audit(1663925164.252:2793): pid=23069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/405/bus" dev="sda1" ino=14497 res=1 09:26:04 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa600000000000000) 09:26:04 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbd00000000000000) 09:26:04 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa601000000000000) [ 930.843935] audit: type=1804 audit(1663925164.492:2794): pid=23069 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/405/bus" dev="sda1" ino=14497 res=1 09:26:04 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 64) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 32) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async, rerun: 32) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0xab) (async) sendfile(r5, r3, 0x0, 0x5) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:04 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2c01000000000000) 09:26:04 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbd01000000000000) 09:26:04 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x0) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 930.994786] audit: type=1804 audit(1663925164.532:2795): pid=23086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1922/bus" dev="sda1" ino=14502 res=1 09:26:04 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa700000000000000) [ 931.199914] audit: type=1804 audit(1663925164.973:2796): pid=23110 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/406/bus" dev="sda1" ino=14738 res=1 [ 931.257960] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 931.308986] audit: type=1804 audit(1663925165.083:2797): pid=23095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1922/bus" dev="sda1" ino=14502 res=1 [ 931.387474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:05 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0xab) sendfile(r5, r3, 0x0, 0x5) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:05 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa701000000000000) 09:26:05 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2d00000000000000) 09:26:05 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbe00000000000000) 09:26:05 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:05 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) write(r2, &(0x7f0000000200)="fcd553e0c10b0c427308d43cd9bbfa1fd17f1daeeaf73a2b910c2df31d1f711d2b775fccb45d9730d2ad20a6314bcea99b6cd54707221a904442e226355ed007e12bdb95d15b65980e6d6e89dcd6bb1226ea77a1dfd020e2417d6fa2bfa4e1cfa143972dad660de450ba5eedc4c4c480030753a02b22b61a3cc858c07366745d02dabb289cd5b0d0c159a04993961f04187239a7b7384b9b0ad5382d6368f7849c0cc5e160a20a13997081df5afe92f4cf46c1e576564229f93c6db1a86283ce156a007c12edd88ff58da4e65cfd9a60225cad8e625ba9707a74a0b1e7c006bb5ce697a69aace1906372810a14adb70fc1db8e51f7cd7d7288", 0xf9) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000b80)={{}, 0x0, 0x0, @unused=[0x0, 0x2, 0x2], @devid}) 09:26:05 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2d01000000000000) 09:26:05 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa800000000000000) 09:26:05 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbe01000000000000) 09:26:05 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2e00000000000000) 09:26:05 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa801000000000000) 09:26:05 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbf00000000000000) [ 932.136708] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 932.159807] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 932.765474] ieee802154 phy0 wpan0: encryption failed: -22 [ 932.771110] ieee802154 phy1 wpan1: encryption failed: -22 09:26:07 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0xab) sendfile(r5, r3, 0x0, 0x5) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:07 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2e01000000000000) 09:26:07 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xbf01000000000000) 09:26:07 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa900000000000000) 09:26:07 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) write(r2, &(0x7f0000000200)="fcd553e0c10b0c427308d43cd9bbfa1fd17f1daeeaf73a2b910c2df31d1f711d2b775fccb45d9730d2ad20a6314bcea99b6cd54707221a904442e226355ed007e12bdb95d15b65980e6d6e89dcd6bb1226ea77a1dfd020e2417d6fa2bfa4e1cfa143972dad660de450ba5eedc4c4c480030753a02b22b61a3cc858c07366745d02dabb289cd5b0d0c159a04993961f04187239a7b7384b9b0ad5382d6368f7849c0cc5e160a20a13997081df5afe92f4cf46c1e576564229f93c6db1a86283ce156a007c12edd88ff58da4e65cfd9a60225cad8e625ba9707a74a0b1e7c006bb5ce697a69aace1906372810a14adb70fc1db8e51f7cd7d7288", 0xf9) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000b80)={{}, 0x0, 0x0, @unused=[0x0, 0x2, 0x2], @devid}) 09:26:07 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:07 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2f00000000000000) 09:26:07 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc000000000000000) 09:26:07 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xa901000000000000) [ 933.364474] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:07 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) write(r2, &(0x7f0000000200)="fcd553e0c10b0c427308d43cd9bbfa1fd17f1daeeaf73a2b910c2df31d1f711d2b775fccb45d9730d2ad20a6314bcea99b6cd54707221a904442e226355ed007e12bdb95d15b65980e6d6e89dcd6bb1226ea77a1dfd020e2417d6fa2bfa4e1cfa143972dad660de450ba5eedc4c4c480030753a02b22b61a3cc858c07366745d02dabb289cd5b0d0c159a04993961f04187239a7b7384b9b0ad5382d6368f7849c0cc5e160a20a13997081df5afe92f4cf46c1e576564229f93c6db1a86283ce156a007c12edd88ff58da4e65cfd9a60225cad8e625ba9707a74a0b1e7c006bb5ce697a69aace1906372810a14adb70fc1db8e51f7cd7d7288", 0xf9) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000b80)={{}, 0x0, 0x0, @unused=[0x0, 0x2, 0x2], @devid}) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) write(r2, &(0x7f0000000200)="fcd553e0c10b0c427308d43cd9bbfa1fd17f1daeeaf73a2b910c2df31d1f711d2b775fccb45d9730d2ad20a6314bcea99b6cd54707221a904442e226355ed007e12bdb95d15b65980e6d6e89dcd6bb1226ea77a1dfd020e2417d6fa2bfa4e1cfa143972dad660de450ba5eedc4c4c480030753a02b22b61a3cc858c07366745d02dabb289cd5b0d0c159a04993961f04187239a7b7384b9b0ad5382d6368f7849c0cc5e160a20a13997081df5afe92f4cf46c1e576564229f93c6db1a86283ce156a007c12edd88ff58da4e65cfd9a60225cad8e625ba9707a74a0b1e7c006bb5ce697a69aace1906372810a14adb70fc1db8e51f7cd7d7288", 0xf9) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000000b80)={{}, 0x0, 0x0, @unused=[0x0, 0x2, 0x2], @devid}) (async) [ 933.453680] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:07 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x2f01000000000000) 09:26:07 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc001000000000000) [ 933.792461] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x1, 0x29, 0x7, 0x0, 0x7f, 0x40026, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x5, 0x1000}, 0x80, 0x3, 0xffffff80, 0x0, 0x4000000000, 0x0, 0x1, 0x0, 0xa5}, 0x0, 0x6, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x95240300, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x8095}}}}}}]}, 0x48}}, 0x0) listen(0xffffffffffffffff, 0x3) socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r3 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000006c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=@gettaction={0xa0, 0x32, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0x10, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x41}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1c00}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x14, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24044014}, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200)) 09:26:08 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3000000000000000) 09:26:08 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xaa00000000000000) 09:26:08 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc100000000000000) 09:26:08 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x0, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:08 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffefffffffff, r0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000006, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) timer_create(0x2, &(0x7f00000003c0)={0x0, 0x34, 0x0, @thr={&(0x7f0000000200)="f38abcc99cf6d2f50dae451fa446f940e6c601ef4f7291ea57aa9d20fc08485d7617da11ec22247a480b2b696810c88ffb48f784fc67a343d8054b62d88d0d896a24a65da534514998fef517230026679058a90a02d8bd0a405d86fcf541e4bd95a43140a5a5fff9b88a3e96c4fb2a8de1fb70186fc57b56e43d24364a048cd6677142ad9081b9e929806caee71894a83c4ecb40b0014cd4256e5e742608b181f870bdaa4c99f852c8a8d4045071b607fba226371a09be5c9d9e3dbaa6b1e7a2f48a15766568385f6638c094fef32167095e05aa47cf0d104201af897a856571686350", &(0x7f0000000300)="01b92442c464de8f43d6ffd5afb060877a59a5fdc861b810d3ac0b93651fdc362c8020f1f405c4d41f05bc5ea835f8240bf9d99152307f2485aaf14b20a878c2546c669cd573c9483d104eb0a7800c34fd58a07477cde3c38342514caf74f2b9630d9a66aa96e23b24aef173f1b12ad5dffccca2f7993d1a667e07f1c6bca5692988cba896eae5e449db0b95"}}, &(0x7f0000000400)) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000080)=0x1) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) 09:26:08 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xaa01000000000000) 09:26:08 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc101000000000000) 09:26:08 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3001000000000000) [ 934.570940] xt_CT: You must specify a L4 protocol and not use inversions on it [ 934.645280] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 934.670501] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:08 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xab00000000000000) 09:26:08 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3100000000000000) 09:26:08 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc200000000000000) 09:26:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x1, 0x29, 0x7, 0x0, 0x7f, 0x40026, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x5, 0x1000}, 0x80, 0x3, 0xffffff80, 0x0, 0x4000000000, 0x0, 0x1, 0x0, 0xa5}, 0x0, 0x6, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x95240300, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x8095}}}}}}]}, 0x48}}, 0x0) listen(0xffffffffffffffff, 0x3) socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r3 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000006c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=@gettaction={0xa0, 0x32, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0x10, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x41}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1c00}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x14, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24044014}, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getpid() (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x1, 0x29, 0x7, 0x0, 0x7f, 0x40026, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x5, 0x1000}, 0x80, 0x3, 0xffffff80, 0x0, 0x4000000000, 0x0, 0x1, 0x0, 0xa5}, 0x0, 0x6, r0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x95240300, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x8095}}}}}}]}, 0x48}}, 0x0) (async) listen(0xffffffffffffffff, 0x3) (async) socket$inet_dccp(0x2, 0x6, 0x0) (async) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x40) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) accept4(r2, 0x0, 0x0, 0x0) (async) sendto$inet(r3, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) (async) sendmsg$nl_route_sched(r3, &(0x7f00000006c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=@gettaction={0xa0, 0x32, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0x10, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x41}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1c00}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x14, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24044014}, 0x0) (async) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200)) (async) 09:26:08 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xab01000000000000) [ 934.947092] kauditd_printk_skb: 56 callbacks suppressed [ 934.947105] audit: type=1804 audit(1663925168.723:2854): pid=23271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/409/bus" dev="sda1" ino=15153 res=1 09:26:08 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc201000000000000) 09:26:08 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xac00000000000000) [ 935.093615] xt_CT: You must specify a L4 protocol and not use inversions on it 09:26:09 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc300000000000000) 09:26:09 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffefffffffff, r0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000006, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) timer_create(0x2, &(0x7f00000003c0)={0x0, 0x34, 0x0, @thr={&(0x7f0000000200)="f38abcc99cf6d2f50dae451fa446f940e6c601ef4f7291ea57aa9d20fc08485d7617da11ec22247a480b2b696810c88ffb48f784fc67a343d8054b62d88d0d896a24a65da534514998fef517230026679058a90a02d8bd0a405d86fcf541e4bd95a43140a5a5fff9b88a3e96c4fb2a8de1fb70186fc57b56e43d24364a048cd6677142ad9081b9e929806caee71894a83c4ecb40b0014cd4256e5e742608b181f870bdaa4c99f852c8a8d4045071b607fba226371a09be5c9d9e3dbaa6b1e7a2f48a15766568385f6638c094fef32167095e05aa47cf0d104201af897a856571686350", &(0x7f0000000300)="01b92442c464de8f43d6ffd5afb060877a59a5fdc861b810d3ac0b93651fdc362c8020f1f405c4d41f05bc5ea835f8240bf9d99152307f2485aaf14b20a878c2546c669cd573c9483d104eb0a7800c34fd58a07477cde3c38342514caf74f2b9630d9a66aa96e23b24aef173f1b12ad5dffccca2f7993d1a667e07f1c6bca5692988cba896eae5e449db0b95"}}, &(0x7f0000000400)) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000080)=0x1) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffefffffffff, r0, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20000006, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) timer_create(0x2, &(0x7f00000003c0)={0x0, 0x34, 0x0, @thr={&(0x7f0000000200)="f38abcc99cf6d2f50dae451fa446f940e6c601ef4f7291ea57aa9d20fc08485d7617da11ec22247a480b2b696810c88ffb48f784fc67a343d8054b62d88d0d896a24a65da534514998fef517230026679058a90a02d8bd0a405d86fcf541e4bd95a43140a5a5fff9b88a3e96c4fb2a8de1fb70186fc57b56e43d24364a048cd6677142ad9081b9e929806caee71894a83c4ecb40b0014cd4256e5e742608b181f870bdaa4c99f852c8a8d4045071b607fba226371a09be5c9d9e3dbaa6b1e7a2f48a15766568385f6638c094fef32167095e05aa47cf0d104201af897a856571686350", &(0x7f0000000300)="01b92442c464de8f43d6ffd5afb060877a59a5fdc861b810d3ac0b93651fdc362c8020f1f405c4d41f05bc5ea835f8240bf9d99152307f2485aaf14b20a878c2546c669cd573c9483d104eb0a7800c34fd58a07477cde3c38342514caf74f2b9630d9a66aa96e23b24aef173f1b12ad5dffccca2f7993d1a667e07f1c6bca5692988cba896eae5e449db0b95"}}, &(0x7f0000000400)) (async) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) (async) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000080)=0x1) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) 09:26:09 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc301000000000000) 09:26:09 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xac01000000000000) 09:26:09 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3101000000000000) 09:26:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() (async, rerun: 64) socket$inet6_tcp(0xa, 0x1, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x1, 0x29, 0x7, 0x0, 0x7f, 0x40026, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x5, 0x1000}, 0x80, 0x3, 0xffffff80, 0x0, 0x4000000000, 0x0, 0x1, 0x0, 0xa5}, 0x0, 0x6, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x95240300, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x8095}}}}}}]}, 0x48}}, 0x0) (async) listen(0xffffffffffffffff, 0x3) socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x40) (async, rerun: 64) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) r3 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) (async) sendmsg$nl_route_sched(r3, &(0x7f00000006c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=@gettaction={0xa0, 0x32, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0x10, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x41}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1c00}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x14, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24044014}, 0x0) (async, rerun: 32) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200)) (rerun: 32) 09:26:09 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(0x0, 0x0) 09:26:09 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc400000000000000) 09:26:09 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xad00000000000000) 09:26:09 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3200000000000000) [ 935.586305] audit: type=1804 audit(1663925169.363:2855): pid=23340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/410/bus" dev="sda1" ino=15153 res=1 09:26:09 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc401000000000000) 09:26:09 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xad01000000000000) [ 935.636821] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x1, 0x29, 0x7, 0x0, 0x7f, 0x40026, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x5, 0x1000}, 0x80, 0x3, 0xffffff80, 0x0, 0x4000000000, 0x0, 0x1, 0x0, 0xa5}, 0x0, 0x6, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x95240300, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x8095}}}}}}]}, 0x48}}, 0x0) listen(0xffffffffffffffff, 0x3) socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r3 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000006c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=@gettaction={0xa0, 0x32, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0x10, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x41}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1c00}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x14, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24044014}, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200)) 09:26:09 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0xffffffefffffffff, r0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000006, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 32) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async, rerun: 32) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (rerun: 32) faccessat(0xffffffffffffffff, 0x0, 0x0) timer_create(0x2, &(0x7f00000003c0)={0x0, 0x34, 0x0, @thr={&(0x7f0000000200)="f38abcc99cf6d2f50dae451fa446f940e6c601ef4f7291ea57aa9d20fc08485d7617da11ec22247a480b2b696810c88ffb48f784fc67a343d8054b62d88d0d896a24a65da534514998fef517230026679058a90a02d8bd0a405d86fcf541e4bd95a43140a5a5fff9b88a3e96c4fb2a8de1fb70186fc57b56e43d24364a048cd6677142ad9081b9e929806caee71894a83c4ecb40b0014cd4256e5e742608b181f870bdaa4c99f852c8a8d4045071b607fba226371a09be5c9d9e3dbaa6b1e7a2f48a15766568385f6638c094fef32167095e05aa47cf0d104201af897a856571686350", &(0x7f0000000300)="01b92442c464de8f43d6ffd5afb060877a59a5fdc861b810d3ac0b93651fdc362c8020f1f405c4d41f05bc5ea835f8240bf9d99152307f2485aaf14b20a878c2546c669cd573c9483d104eb0a7800c34fd58a07477cde3c38342514caf74f2b9630d9a66aa96e23b24aef173f1b12ad5dffccca2f7993d1a667e07f1c6bca5692988cba896eae5e449db0b95"}}, &(0x7f0000000400)) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800100020046) (async, rerun: 32) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000080)=0x1) (async, rerun: 32) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) 09:26:09 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3201000000000000) 09:26:09 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc500000000000000) 09:26:09 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xae00000000000000) 09:26:09 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc501000000000000) [ 935.995175] xt_CT: You must specify a L4 protocol and not use inversions on it [ 936.127795] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:10 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(0x0, 0x0) 09:26:10 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xae01000000000000) 09:26:10 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3300000000000000) 09:26:10 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x1, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xd3, 0x1, 0x4, 0x44, 0x0, 0xde, 0x4000, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3, 0xfffffffffffffffa}, 0x960, 0x7, 0xfff, 0x2, 0x7, 0x8, 0xfff9, 0x0, 0x2, 0x0, 0x8}, r1, 0x4, r2, 0xb) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:10 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc600000000000000) 09:26:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x1, 0x29, 0x7, 0x0, 0x7f, 0x40026, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_config_ext={0x5, 0x1000}, 0x80, 0x3, 0xffffff80, 0x0, 0x4000000000, 0x0, 0x1, 0x0, 0xa5}, 0x0, 0x6, r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x401, 0x0, 0x95240300, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x8095}}}}}}]}, 0x48}}, 0x0) listen(0xffffffffffffffff, 0x3) socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) r3 = accept4(r2, 0x0, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000180)="0af22e2283c90b2f1fb6cf5ec468282cdfb6666a33a76b536994d60a9fb6b4ef84342fa90fa4ac2f57de33e7f904edb88317bc64954d7f62266f059a58828349f4595fa268e43c495eabc0661acbea6556f8f082bc9e7d108200d7e5e8d777cb5f7af4fe040194a2fcc82abaee688254a1078fb93831f7e4dfb7f5fe2b904efe78c3511a522225d1bb05a5776bd7cbe1e5c868fe5ef8f929762b2a8f", 0x9c, 0x40, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000006c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000600)=@gettaction={0xa0, 0x32, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@action_gd=@TCA_ACT_TAB={0x2c, 0x1, [{0x10, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x41}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1c00}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffc}}, {0x14, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xe, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24044014}, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f0000000200)) 09:26:10 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc601000000000000) 09:26:10 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xaf00000000000000) 09:26:10 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3301000000000000) 09:26:10 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc700000000000000) [ 936.559282] xt_CT: You must specify a L4 protocol and not use inversions on it [ 936.573848] audit: type=1804 audit(1663925170.353:2856): pid=23432 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1503/bus" dev="sda1" ino=15714 res=1 09:26:10 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3400000000000000) [ 936.628626] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:10 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xaf01000000000000) [ 936.723263] audit: type=1804 audit(1663925170.503:2857): pid=23432 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1503/bus" dev="sda1" ino=15714 res=1 [ 936.774779] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 936.895810] audit: type=1804 audit(1663925170.533:2858): pid=23446 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/411/bus" dev="sda1" ino=15682 res=1 09:26:11 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(0x0, 0x0) 09:26:11 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x1, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xd3, 0x1, 0x4, 0x44, 0x0, 0xde, 0x4000, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3, 0xfffffffffffffffa}, 0x960, 0x7, 0xfff, 0x2, 0x7, 0x8, 0xfff9, 0x0, 0x2, 0x0, 0x8}, r1, 0x4, r2, 0xb) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x1, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xd3, 0x1, 0x4, 0x44, 0x0, 0xde, 0x4000, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3, 0xfffffffffffffffa}, 0x960, 0x7, 0xfff, 0x2, 0x7, 0x8, 0xfff9, 0x0, 0x2, 0x0, 0x8}, r1, 0x4, r2, 0xb) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:26:11 executing program 4: ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000080)) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x4000}, 0x3000, &(0x7f00000000c0)}, 0x1000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) accept4(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r3, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="000834aae24a00002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) bind$alg(r3, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 09:26:11 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3401000000000000) 09:26:11 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc701000000000000) 09:26:11 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb000000000000000) 09:26:11 executing program 4: ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000080)) (async, rerun: 32) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) (async) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x4000}, 0x3000, &(0x7f00000000c0)}, 0x1000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) (async) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) accept4(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r3, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="000834aae24a00002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) (async, rerun: 64) bind$alg(r3, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) [ 937.690077] xt_CT: You must specify a L4 protocol and not use inversions on it 09:26:11 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc800000000000000) 09:26:11 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3500000000000000) 09:26:11 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb001000000000000) [ 937.849067] xt_CT: You must specify a L4 protocol and not use inversions on it [ 937.870272] audit: type=1804 audit(1663925171.643:2859): pid=23485 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1504/bus" dev="sda1" ino=15153 res=1 09:26:11 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3501000000000000) 09:26:11 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc801000000000000) [ 937.873657] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 937.954742] audit: type=1804 audit(1663925171.733:2860): pid=23487 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1504/bus" dev="sda1" ino=15153 res=1 [ 938.128385] audit: type=1804 audit(1663925171.903:2861): pid=23519 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/412/bus" dev="sda1" ino=15891 res=1 [ 938.168745] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:12 executing program 4: ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000080)) (async) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x4000}, 0x3000, &(0x7f00000000c0)}, 0x1000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) (async) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) (async) accept4(r2, 0x0, 0x0, 0x0) (async) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r3, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="f5e4b9941dd171c9696f73c373681267ada2132e1859796e4f34fc368ae121bbed1e7048dbb2b39542bd9f65247d0394593d2cb0ee590d3905164104311c91971eca364a705779d208aa7af4f50852651b2b3c950287b164c205dfb469e8cddfc1c22f2e5a133b47759071ba2f072745308b222138b42c6be83baed6a82a09ccd9d410ec5189adf46ab7f472d28f26146096c525c5b74bdbf3e3af13cc221be43b625f90e5bad4d64911921235ec62bbabafc57fb90b3cf8dfe267e831f92fb379dff9405a77f7d2a96e669f07a15a0581373922b8c702bfb6626a379d140c181a3f108d19951a7d9efd1c446f0cffbf7d9748d568207d5b3f6a2bce490d1341b1076bc4e889915ff2bfdff0513a35ba2b0b5466b9dedc", @ANYRES32=r2, @ANYBLOB="000834aae24a00002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) (async) bind$alg(r3, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 09:26:12 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb100000000000000) 09:26:12 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x1, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 32) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 32) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async, rerun: 64) listen(r3, 0x0) (async, rerun: 64) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xd3, 0x1, 0x4, 0x44, 0x0, 0xde, 0x4000, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x3, 0xfffffffffffffffa}, 0x960, 0x7, 0xfff, 0x2, 0x7, 0x8, 0xfff9, 0x0, 0x2, 0x0, 0x8}, r1, 0x4, r2, 0xb) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:12 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3600000000000000) 09:26:12 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc900000000000000) 09:26:12 executing program 3: ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000080)) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x4000}, 0x3000, &(0x7f00000000c0)}, 0x1000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) accept4(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r3, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="000834aae24a00002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) bind$alg(r3, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 09:26:12 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb101000000000000) 09:26:12 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xc901000000000000) [ 939.032251] xt_CT: You must specify a L4 protocol and not use inversions on it 09:26:12 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(0x0, 0x0) 09:26:12 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3601000000000000) [ 939.095225] audit: type=1804 audit(1663925172.873:2862): pid=23544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1505/bus" dev="sda1" ino=15845 res=1 09:26:12 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2000800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0xbe) 09:26:13 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb200000000000000) 09:26:13 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xca00000000000000) [ 939.228088] audit: type=1804 audit(1663925172.873:2863): pid=23544 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1505/bus" dev="sda1" ino=15845 res=1 09:26:13 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3700000000000000) 09:26:13 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb201000000000000) [ 939.407438] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:13 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xca01000000000000) 09:26:13 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3701000000000000) [ 939.516448] xt_CT: You must specify a L4 protocol and not use inversions on it 09:26:13 executing program 3: ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000080)) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x4000}, 0x3000, &(0x7f00000000c0)}, 0x1000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) accept4(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r3, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="f5e4b9941dd171c9696f73c373681267ada2132e1859796e4f34fc368ae121bbed1e7048dbb2b39542bd9f65247d0394593d2cb0ee590d3905164104311c91971eca364a705779d208aa7af4f50852651b2b3c950287b164c205dfb469e8cddfc1c22f2e5a133b47759071ba2f072745308b222138b42c6be83baed6a82a09ccd9d410ec5189adf46ab7f472d28f26146096c525c5b74bdbf3e3af13cc221be43b625f90e5bad4d64911921235ec62bbabafc57fb90b3cf8dfe267e831f92fb379dff9405a77f7d2a96e669f07a15a0581373922b8c702bfb6626a379d140c181a3f108d19951a7d9efd1c446f0cffbf7d9748d568207d5b3f6a2bce490d1341b1076bc4e889915ff2bfdff0513a35ba2b0b5466b9dedc", @ANYRES32=r2, @ANYBLOB="000834aae24a00002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) bind$alg(r3, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 09:26:13 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async, rerun: 64) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async, rerun: 64) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async, rerun: 64) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 64) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2000800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async, rerun: 64) creat(&(0x7f0000000200)='./bus\x00', 0xbe) 09:26:13 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3800000000000000) [ 939.990700] xt_CT: You must specify a L4 protocol and not use inversions on it [ 940.098910] kauditd_printk_skb: 35 callbacks suppressed [ 940.098924] audit: type=1804 audit(1663925173.873:2899): pid=23605 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1507/bus" dev="sda1" ino=16099 res=1 09:26:14 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xcb00000000000000) 09:26:14 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(0x0, 0x0) 09:26:14 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb300000000000000) 09:26:14 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3801000000000000) 09:26:14 executing program 3: ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000080)) perf_event_open(&(0x7f0000000a80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x4000}, 0x3000, &(0x7f00000000c0)}, 0x1000000}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) accept4(r2, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r3, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="000834aae24a00002e2f66696c65300088698ebd9829f64220b8849384ce1bfc770836"]) bind$alg(r3, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 09:26:14 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2000800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0xbe) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2000800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000200)='./bus\x00', 0xbe) (async) 09:26:14 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3900000000000000) 09:26:14 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb301000000000000) 09:26:14 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3901000000000000) [ 940.665732] xt_CT: You must specify a L4 protocol and not use inversions on it [ 940.703575] audit: type=1804 audit(1663925174.483:2900): pid=23634 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1508/bus" dev="sda1" ino=16270 res=1 [ 940.704371] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:14 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xcb01000000000000) [ 940.866810] audit: type=1804 audit(1663925174.623:2901): pid=23641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1508/bus" dev="sda1" ino=16270 res=1 09:26:14 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 1) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:14 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./bus\x00', 0x361903, 0x25) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 941.010297] audit: type=1804 audit(1663925174.783:2902): pid=23638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir3819079162/syzkaller.ernEnR/1934/bus" dev="sda1" ino=16282 res=1 [ 941.137162] audit: type=1804 audit(1663925174.913:2903): pid=23674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/416/bus" dev="sda1" ino=16247 res=1 [ 941.148730] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 941.221187] FAULT_INJECTION: forcing a failure. [ 941.221187] name failslab, interval 1, probability 0, space 0, times 0 [ 941.256081] audit: type=1804 audit(1663925175.033:2904): pid=23678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1509/bus" dev="sda1" ino=16243 res=1 [ 941.267038] CPU: 1 PID: 23674 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 941.287949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 941.297309] Call Trace: [ 941.299914] dump_stack+0x1fc/0x2ef [ 941.303562] should_fail.cold+0xa/0xf [ 941.307394] ? setup_fault_attr+0x200/0x200 [ 941.311720] ? lock_acquire+0x1ec/0x3c0 [ 941.315713] __should_failslab+0x115/0x180 [ 941.319959] should_failslab+0x5/0x10 [ 941.323769] kmem_cache_alloc_trace+0x284/0x380 [ 941.328454] alloc_pipe_info+0xb8/0x470 [ 941.332445] splice_direct_to_actor+0x6dd/0x8d0 [ 941.337126] ? apparmor_getprocattr+0x11e0/0x11e0 [ 941.341986] ? generic_pipe_buf_nosteal+0x10/0x10 [ 941.346846] ? do_splice_to+0x160/0x160 [ 941.350833] ? security_file_permission+0x1c0/0x220 [ 941.355875] do_splice_direct+0x1a7/0x270 [ 941.360042] ? splice_direct_to_actor+0x8d0/0x8d0 [ 941.364901] ? security_file_permission+0x1c0/0x220 [ 941.369939] do_sendfile+0x550/0xc30 [ 941.373680] ? do_compat_pwritev64+0x1b0/0x1b0 [ 941.378280] ? vfs_write+0x393/0x540 [ 941.382015] __se_sys_sendfile64+0x147/0x160 [ 941.386441] ? __se_sys_sendfile+0x180/0x180 [ 941.390863] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 941.396252] ? trace_hardirqs_off_caller+0x6e/0x210 [ 941.401282] ? do_syscall_64+0x21/0x620 [ 941.405272] do_syscall_64+0xf9/0x620 [ 941.409087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.414275] RIP: 0033:0x7f77b0c76669 [ 941.417992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 941.436898] RSP: 002b:00007f77af5c9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 941.444615] RAX: ffffffffffffffda RBX: 00007f77b0d98050 RCX: 00007f77b0c76669 [ 941.451895] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 941.459181] RBP: 00007f77af5c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 941.466468] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 941.473753] R13: 00007ffc70b96cdf R14: 00007f77af5c9300 R15: 0000000000022000 [ 941.628435] audit: type=1804 audit(1663925175.403:2905): pid=23687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/416/bus" dev="sda1" ino=16247 res=1 [ 941.684701] audit: type=1804 audit(1663925175.423:2906): pid=23678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1509/bus" dev="sda1" ino=16243 res=1 09:26:15 executing program 4: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(0x0, 0x0) 09:26:15 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb400000000000000) 09:26:15 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3a00000000000000) 09:26:15 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xcc00000000000000) 09:26:15 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 2) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:15 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./bus\x00', 0x361903, 0x25) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:15 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb401000000000000) 09:26:15 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3a01000000000000) [ 942.100535] audit: type=1804 audit(1663925175.873:2907): pid=23707 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1510/bus" dev="sda1" ino=14016 res=1 09:26:15 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb500000000000000) 09:26:16 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./bus\x00', 0x361903, 0x25) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 942.213619] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:26:16 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xcc01000000000000) [ 942.255798] audit: type=1804 audit(1663925175.973:2908): pid=23716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/417/bus" dev="sda1" ino=16289 res=1 [ 942.306002] FAULT_INJECTION: forcing a failure. [ 942.306002] name failslab, interval 1, probability 0, space 0, times 0 [ 942.321028] CPU: 0 PID: 23716 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 942.328939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 942.338299] Call Trace: [ 942.340908] dump_stack+0x1fc/0x2ef [ 942.344568] should_fail.cold+0xa/0xf [ 942.348561] ? setup_fault_attr+0x200/0x200 [ 942.352902] ? lock_acquire+0x170/0x3c0 [ 942.356910] __should_failslab+0x115/0x180 [ 942.361175] should_failslab+0x5/0x10 [ 942.364991] __kmalloc+0x2ab/0x3c0 [ 942.368557] ? alloc_pipe_info+0x193/0x470 [ 942.372827] alloc_pipe_info+0x193/0x470 [ 942.376909] splice_direct_to_actor+0x6dd/0x8d0 [ 942.381598] ? apparmor_getprocattr+0x11e0/0x11e0 [ 942.386462] ? generic_pipe_buf_nosteal+0x10/0x10 [ 942.391324] ? do_splice_to+0x160/0x160 [ 942.395312] ? security_file_permission+0x1c0/0x220 [ 942.400355] do_splice_direct+0x1a7/0x270 [ 942.404545] ? splice_direct_to_actor+0x8d0/0x8d0 [ 942.409415] ? security_file_permission+0x1c0/0x220 [ 942.414461] do_sendfile+0x550/0xc30 [ 942.418200] ? do_compat_pwritev64+0x1b0/0x1b0 [ 942.420018] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 942.422786] ? vfs_write+0x393/0x540 [ 942.422806] __se_sys_sendfile64+0x147/0x160 [ 942.422821] ? __se_sys_sendfile+0x180/0x180 [ 942.422840] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 942.451026] ? trace_hardirqs_off_caller+0x6e/0x210 [ 942.456059] ? do_syscall_64+0x21/0x620 [ 942.460049] do_syscall_64+0xf9/0x620 [ 942.463869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.469070] RIP: 0033:0x7f77b0c76669 [ 942.472790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 942.491696] RSP: 002b:00007f77af5c9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 942.499428] RAX: ffffffffffffffda RBX: 00007f77b0d98050 RCX: 00007f77b0c76669 09:26:16 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3b00000000000000) [ 942.506717] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 942.514024] RBP: 00007f77af5c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 942.521308] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 942.528591] R13: 00007ffc70b96cdf R14: 00007f77af5c9300 R15: 0000000000022000 09:26:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x1) r2 = socket(0x9, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) accept4(r4, 0x0, 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r5, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="00080000000000002e2f66696c65300091d8cefd56d188698ebd9829f64228b8849384"]) sendmmsg(r4, &(0x7f0000000780)=[{{&(0x7f0000000080)=@ethernet={0x1, @remote}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)="ca61dd44a869a8ff67ce7c039dc27a96a9a8dd832a506f1c4d90fe407a962c83d67920d90416b41863fa1f215f6c8a33ad3fcb5bec2a0b978fc562c1fbd34a66d929455c0d215edb5189056f91f4e6f649f9bbe14b53d320e2d86159ef10404987fd", 0x62}, {&(0x7f0000000840)="76199c2e0e603f614071d58f485f8628ce4fef4462dd63ba53e22a3196589816d2b178afda03d9ed42aa1b6dc0e8248a75fc5eb5c8b70ded4803cacb9b26fe00f0350f4261b087", 0x47}, {&(0x7f00000001c0)="728f357c796a35a8c8c598991c0ef9fc117b9dbd2b6ac3b02ac4d3aaef8dcb0c3ecf4f20d6f0deb57b425fce1965c8bf31d5109fa0dda933b2507f2f", 0x3c}, {&(0x7f0000000300)="50a68ae8d76d3da974f4527b930abbe128a7801833871ff44ac6e2a86f477c61684f971b93ea25c73413d1bed6d671f275270f231f4dc5a7152c8f1062cd5b98c0a6398af7", 0x45}], 0x4}}, {{&(0x7f0000000480)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(seqiv(morus1280))\x00'}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000500)="ba8be1b4a10cb788a5", 0x9}, {&(0x7f0000001900)="e064e69850fb0aa25e358b04e0c6ad4caaec8f2248cc5087b6f457ccac251fbcfd41d2e8b61dc1b935f004e7b4f91932ec7f1db232513cbc2132a80433b902a2f3de0051fcd47bd1b17358c226a3847fb09c46da4637bd8ce09abb5f0d11d5ae7b72ef6d90b798e9d75ad4588d7cf7b1fb3e73e089ab458870f14d47232b81690e4746cff1f87565e2826bd2087d7dd096dcd6b3f0b0b1657575e4ea5011745520ac515430ac04a14cadf0faa032af68376885a2d55cc63e9e30c185c4fa24d74a9429ac850566eb6aeab154085d", 0xce}, {&(0x7f0000000640)="8dc23077e48912701b2864028744be0179325da517f07cdef067f43caa665b816c58e7bdfb5886a1de764e51cd084a4a468d7982848ffd029671516589877bd0422e487694a4734b5d9d5981e4646fc6419637ffcbf6a1f6d242e8cbec9fb5e980184c089021d86e4e54ff07d55885bc202d5c7d8e3d66c7b8c26d66f5b5d6ed5ab72a9658e29c308dc5e2c895357965a6e640962783105f007c93c16700e6eec5faed3673fe0e027389e2", 0xab}, {&(0x7f0000000900)="3822d0cdbb3f0fd313d86036b02586e6d44c3978dc27890e48175b3145d6e16ac07bb149979b153a2661d42aada25effbd59eb78ec7b2eadf4d75bf052aa28536da4aaf8ba1f4ec6fce666f5591fe0081ed35c10c76ab0702a9c95ae85fef8eb26aeea5c12514ed567c7eb5d88321bed0d7e334e43fd45f599af9141e723139aacac28f740bf2a3801fa9630f2e25c88e972f1c6a6ad0aa38447c8781ac1ac06e9e31fda4adc61ba6ba75e2f5c30575556e5ee50b9574d919eb62261524b994738768fbaa344a492e9d7d216743f0ba542ecaa2ae7e75e42de737e4167245dc3953ad3f20725a0fb41d2bb92a6a976e2e066f4c92e0ce7ae3904b7cd28b8e024fe28c1adb00af72d34fe075b3ddbd2ffcab73f82000d7ccbf44680656a6a2729d9b24c8a75b1a25bc0bb701d58e95b611a5cc18c8fcf58a11bc11d3438be780c7a2f495808a31318844fabb47dcfa2d94fab188a816564d737ed34ad1985a04917651a2b01c0e01652ac0768b7027cc88202849d4dc302b34bdcacd6ae9aa6710dbacf877ff001e74147a08be219d27cd21531cacd9d8668d632bb1cf5ec0633d37e9c9e4cab13f60e6ef91d81771b4eb276a650522f65732a87d0c231e3751657d0184bf6d147c9708e1e169efcb1f5c9a4ce77779e9c2a34c84d2067414856ef887924ad6b775c4575e4d0a6f1abd894d8691c699cca14469f7015138a0de6a821fc2bc8fa0388a50b469f991558960d7f400eb6412cd09b82520663133358bcebe49cff8e4ae292ad09eecc5f1ffe17336a7720ce933f8b4d8052e6ed1ed5c6c1430223b75269001c3db0f59fbf5efb3f29368f7ca2211bf8d88d6d4baddafc1f79d4ca903878b09823e5d2a06b749550ddf7528bce282eaddd4d3f996d3d43334c1b3962fe29151f0759780c9964caf832bc02ae9df6be9d37f2360a6d40217c0debe91c64824f3d27153bd5f524072f8e6409fd1b3d92a31d7f1c796241fc9cd3b8a1a105cd3b16e459f54cd183958a1f5b483bc6e17801d0053ab1975ea1f19c0f36a2d69e24caf93f03c3ca32c9e14f20d1b70ffba40dedff9153f894bbb4b3b3f8ca5635bca5cecc456be064cb9772b682158ca23fc86d99eb335c900d9c39e3525ad316a76d98c7466eb876446715cb845ed1295511ee70122922b538eb26729dc1c9d41147e026fc5ccfff3bba8a710f0a658c6eb8ea6669d5c4be86bdedda4187aad62022541669404a78923ca279e1465c2dbf30fd8d4ffaca4427e2da53a8f5e68fe49ecb35379afa889a05c0dcea920319ea32533f18f019149314513b6015c622456951b5c2d8e3bcec3a068e514ef39b6f83ea419adc1f0d8a215a9024e9146ee99a0bd5829942e444813a207ba45550aae7ec92f49cbdde3d64119f4b4a220728188db21f0c2e6973d3bc69adbc0badd0e0e6ee2c0af69db1657f9bcbe4ae1d6a9e2b6f76ada1aa0b620406e25e3e81bd8c67ffb0bb823734e3e26887cadefc315ede0c959c282635db13b181ef8407def48eff098fc4a8febe8bc237fbbb169f3ae19562bd01b78ea107900e67d51074815cf3b10942782137e6536c13930a97b457837bc26cd13ec7cba41b6e5746597229b7299d98076377d8a1082c28efdac81ec9ed6ff8e178925afa213c3472dd65f1b123566fc049dd08e3933dfb043528e348dfd84f1454bd4ae1b70337e11a1df7bf0070b3e0db660ed01f8ac6a3349368bde10551b45d6719ad1bf311421cc7e84a6eefd68618909c738379ce6b6fb141649f8e0088d77021144de940e1a45f0bc3bc8c4d4fe580bfa685113e5aeaf8f522c3212efdcc3fca8898e72240c0871d47e8d9ef9e47df1aa6a7e72b7997a1e65d4c813e17c2543f2ba44eab57fe016419be2dfbca18d1eb4953588ea9d1d73492c3d3c18e894ede5c7a46f75f248c3973e85a52bc6b4155005a659d91b6424ea25f926e0d0f93ee6869f8b5d2d3054e43b6d853796e78ab1efeef84ffb3f13a7026e213dd6e78435d00da567e00c93930f20f2431cc9f04f7bceb1146b9bd8ced0ef355ab7bd44f17eef9c969bc1f8e4d1ea397d5d242988c6861d957046f3461ff4be8461c7ee0f0167bb785d43121b8b8ac4a789738bbc1a20183f6e1e8fd1fe56977708bd96c87058693b99dc3f05a55b8a2939c29ab812a140b854bf614ce9ca0483a89ec0e10f479acaeded53a8ffee22eb91f27cfee72ac550cdbcc5da0e12bbe33208200964bfd38d5618434daf9095f7b7cd4f38b75c756d36f8bb38326ec966e9ed43b98065e055f89b8c5609cb97072f309eaaa41286461fd4ffcb0208a055e1f7048385e99e65a1e1d42fe5ee1caa3f1f2fc763248f5e631b111e3e0dffe885581292c0d83f663f342f143ffeb8a129bfa3b7a58bbf0f5b9e25e9beef3c7b3d3d32f135e91fc85c716b13df6506c76e36128bb2b8104611e14a30a0f8b74d59c9ee6b4fac0a832ca2d265efe97524cbdf41fe81c3f6a924ef3fa0e27b18dc20bf133dcfed674605bd29a2175552ac14d93bd00c4018ac8e1810bcf33a4cdf751e70a638461f626a342b5153e508024a098bc2e9abb1de04247931c944f978c2138d4ebe284ef71d4c417cc8fb7b1d7c3bcf583101a68a786a3e8d468f99237eb9de84174b6a8fb337b4f6f0f733c7cee5d7ac1a944b9ef587edb8982cbb73db2bd918291646925e91b97e5890f284d3d3917ef208a127efc047b8e7f9cf98cf7301ea0c5dd9ff3e895cbcf10dba9165a40cb7d859b2dc83a28d4b417c17914607a56b5c14f1a1582f25546f641b032f428d48a78fb23b2c716b910d0645e7c0ad1ca91b3e154d7666c5759e36204e24e48bce5a37fbf5c24049e4d401274c1c5005220c273be6b5b8723ed1e4ce2596210e8efc80f1c2e1ee7bfa814ca00a5959cababf98d6a46e870ce2a72ca799f39e97373c55eb9fa95d7a3b56027969ca28088d3a95140f11263ff4bc8dec82ec4dcfa76ed657ad059d1e3fc3507283cb03044fb0aa4d3066a77fe3e8c0b8d2e61971f1356803bf3f14849ec0f58aec568fd6d6f3a56f297c4920dd96cb184d76482ac032fe77044f146bb7810484348cf3dd062ed585f740231de7498df187560ebbc94671bb10f7e9b18f1bca74947eb95d9d1db8afab6810089706e88346d1d4a2498dd26b118647ea276d0fc9fcfa33d6033235f5641d0091417f19a084f6e0648fcd9a8c8858978503738e1eb59647774c9689ae2b39e15489d39cb2510bc007baadcb369774dba2312e1e5ffb52d91234780c495e444cf24b6f98141e306be58d72cfeee895b8b7bdeb5e7a0163d1f9d6e346d918428bc36a24db3735391c269a51314e48fe50d7227fc55a1d320f7b9f84d61c6d5a2f4f259525fc876d06d3108fc946db587764631e25902de166cfaa4754ca6df36a75d873c907c4e5e252b072a583734de58aea229033ea510386d8f881e58440809124a30c11f0705c5c0e17c5500e617eb05476d2a170412492c314a1016e48ace0a2865f82437a466568316947a52355c8a0b3b26c5e62bafcdb6fc464b9a33fc632c86f949dd09ba2c81bd36dd52454b9894b4ea26ff808da60dda789cb01a54486112e2f8459a30f4fa6496631ddb73ca5f5eb3e0868b13b63cfaf6c8eb69a30119549118f4de011b9c43a3765cfbfedff51b57fd4bb5d14f0cb881d555f5b2e55e40bacaee5ef90441edf4c9b689c60977b5c2753953e3e32c18d180401608fa9173deae03e408e781086a8fe4bc629c072352055e137c192a9666db552656a1b9fc5cf93cc889dfbf022e473bb6da5dbdafd22c1fcfe6f8d5596b4a4a98dea37781f23202810aaf5bf502efb216ec05475259fed0374ac0ca85505c6b5d15299153fb59789c325c82b18503072cd3ba1a8013bd8c3412d591da092c3fe44336f6bdbffd2969d8b3fd9d6d8b3de0ef757474c942191ada1d1ad91daadf8324bf3074cd6087ea3c210e288c881b4b334604085b2ae4da7301d0845f4ce41e64e439e89320fdd1b0ab9362ab0f2d6a0c19d116f361bb313f343ffb99e546660f16d08f23a76c51fdcd28b480065fce45e91e402c132f66d3c36ddbd0a768ccd1644343dad3313ace8ebfe08248cdfa391bdb777294dc95074f68459d4fd4b3e118958865360b1c6b53462985f036e1a13557a19d73375c66f7142c94b26ff7ed7caa702326bee2388b0cea3dfa2f570b05a0cc22c652fa3a03fdbcbbd791a7084557a71acfcf3d6852bc5ff205e4e2a4470beb56da6fe496d6d1cf57643aaf8a5bf7aafd611cb15f19ffe9113e0b9793e560fafb650e62d7673b1cf6b29346f33aa63694d048dedbbb9970da04c2cb896c2d5a8bd172d0176d6b1e3e7012e9565babfc2c92cf4a31f71765feb18241a870205fad794cad9e66a8daae46432ace39a0cb60d06a755ec0f175d9eb2b91fea4cbbbb62327f9f80ba8a1503121b316a7fb013971ae5f5acd28033fed83db9631c2f623605e44f00b89b6a86db270fb536f6d8f6672ddb0a4930bbbfa4ad292d634ec85b1ebdc6b770cc7fedbe5e8c70076116c8cd23161a8e508f64a3b360164326ce65c7aa2c565a4dd6a7e1138529c787f7b26aa5be1bb0b674ca094f4430f69aaac78e24c5793e8233b482b3b835e4367e592a2f8c456d80016931b140c470ac9d71c3002aa34726b335cd6ea3a0a67522dfee61911325d3d0ba9c87f4b3b8cff356408929ea541eacc4562d8f41bbf28b4036ea52d9a1ff122469de5a470dcbfbab9c7e11fc2d120913d96c5779f2de05dd6e324609c031565eb26329f42ad6a0e79eb4493789a0f1fb96f50512f18981b3e0e641b073334296c7c54f91aaf562b1d4c22602b528750230be7c0cf19551721310eef836e35c5d6d8be8acd6963ce4b97b111efa02cf102605ae963665794f203e9aa942c8dcd5da92bd2e541a2259bf2a6f4ce83b5af5e160d9a44a70d40179648308445262637784a532d13ea1357bbb2ab4901a9b72053750cd998cee0b8954e9f9dbd6e13722acd70da00e1db1cef09f0d8836db3858b0891b7b82df095ff698eb71eb06562b3e2efdad7891880f9201c0eef19159d50d0c5a3e2a6cf04a271e55b0534efb127061f0007150223e8047bff6977565df627409b1ad921d66b26fb1face35e9dd42aabd89929456c39bb8c9bb8fac7f9311a6c4678423b5658c6002de87413e284f9bc7e89a36a8e0f25d2862672a53c55d2afa517dce9fb677d1978905138d265b458e02fc7cf63ced074975e1c7b0800a6f82a99c93439c1f572036579181c945ffeb41f1c7abcebfbf453367dbeef11bfd2cde77a13d3fa4d731cd2c3a3333aad3f5d3bca6d9e5b8654ba3aee94d8a8749ec39ba35186346c563e55bda302f3e64c40c51d7fcc9501c6ac64bb49f95bf1cee6ec6c6dad4d50b1d5e179b7efbc8c6cc3249e896a37c4ce3394882e769a057f685a52afc2dbdbdc28763bb9a99193e02e4e8f1fb250f905cd7e417d1becab656368eca8a51cac5b54ff800a7271026f4b65f1f652d9165b6e8adf3f35870f34122ac7272c854aeee9d9c4a38f787d55f845ada643e8f76c4217b5ba75ba78147ca73ea7d8333cc0f17849b94322f9438c65d196b0dc8740ea99228fcf98dd5386c18d9db3872e6d78adc307a23ba0e9a694a7431f7e546e0c138532886de58e174c3b5a88200603288860e93b430bda822412975ff65b78c6a323e6af1bfa7d59b352eb9fac4b0ac2ef00c46c973342082669efe937465cf66a47bf045cdc4ab2985a0f82b5", 0x1000}], 0x4, &(0x7f0000000740)}}], 0x2, 0x800) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4800000024001d0f00"/20, @ANYRES32=r3, @ANYBLOB="00b12d5c0d1f9e6c78fc2f47b500f0962f5cf6ffff4710133ae91b44a200689b0eb4fb0c2b479c000200030000004000"], 0x48}}, 0x0) 09:26:17 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3b01000000000000) 09:26:17 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb501000000000000) 09:26:17 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xcd00000000000000) 09:26:17 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4050c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x8) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:17 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 3) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:17 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3c00000000000000) 09:26:17 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xcd01000000000000) 09:26:17 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3c01000000000000) 09:26:17 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4050c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x8) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4050c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x8) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:26:17 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb600000000000000) 09:26:17 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xce00000000000000) [ 943.517953] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 943.566559] FAULT_INJECTION: forcing a failure. [ 943.566559] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 943.623542] CPU: 0 PID: 23768 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 943.631593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 943.640953] Call Trace: [ 943.643560] dump_stack+0x1fc/0x2ef [ 943.647204] should_fail.cold+0xa/0xf [ 943.651019] ? rcu_nmi_exit+0xb3/0x180 [ 943.654926] ? setup_fault_attr+0x200/0x200 [ 943.659268] ? retint_kernel+0x2d/0x2d [ 943.663171] ? crc32c_pcl_intel_update+0x1b9/0x320 [ 943.668122] __alloc_pages_nodemask+0x239/0x2890 [ 943.672907] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 943.677686] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 943.682284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 943.686522] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 943.687051] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 943.700476] ? __brelse+0x84/0xa0 [ 943.703954] ? mark_held_locks+0xf0/0xf0 [ 943.708033] ? mark_held_locks+0xa6/0xf0 [ 943.712193] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 943.716959] alloc_pages_current+0x193/0x2a0 [ 943.721377] skb_page_frag_refill+0x258/0x550 [ 943.725874] sk_page_frag_refill+0x4a/0x1d0 [ 943.730193] sk_alloc_sg+0x154/0x850 [ 943.733924] tls_sw_sendpage+0x4e1/0xd00 [ 943.738003] ? tls_sw_sendmsg+0x1210/0x1210 [ 943.742329] ? ktime_get_coarse_real_ts64+0x123/0x290 [ 943.747525] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 943.752371] ? tls_sw_sendmsg+0x1210/0x1210 [ 943.756699] inet_sendpage+0x164/0x650 [ 943.760588] ? current_time+0x13c/0x1c0 [ 943.764564] ? inet_accept+0x770/0x770 [ 943.768453] sock_sendpage+0xdf/0x140 [ 943.772266] pipe_to_sendpage+0x268/0x330 [ 943.776415] ? sockfs_setattr+0x160/0x160 [ 943.780569] ? direct_splice_actor+0x160/0x160 [ 943.785154] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 943.790524] __splice_from_pipe+0x389/0x800 [ 943.794851] ? direct_splice_actor+0x160/0x160 [ 943.799453] generic_splice_sendpage+0xd4/0x140 [ 943.804125] ? __splice_from_pipe+0x800/0x800 [ 943.808628] ? security_file_permission+0x1c0/0x220 [ 943.813652] ? __splice_from_pipe+0x800/0x800 [ 943.818201] direct_splice_actor+0x115/0x160 [ 943.822617] splice_direct_to_actor+0x33f/0x8d0 [ 943.827290] ? rcu_nmi_exit+0xb3/0x180 [ 943.831184] ? generic_pipe_buf_nosteal+0x10/0x10 [ 943.836034] ? do_splice_to+0x160/0x160 [ 943.840029] do_splice_direct+0x1a7/0x270 [ 943.844182] ? splice_direct_to_actor+0x8d0/0x8d0 [ 943.849032] ? security_file_permission+0x1c0/0x220 [ 943.854056] do_sendfile+0x550/0xc30 [ 943.857780] ? do_compat_pwritev64+0x1b0/0x1b0 [ 943.862386] ? vfs_write+0x393/0x540 [ 943.866106] __se_sys_sendfile64+0x147/0x160 [ 943.870517] ? __se_sys_sendfile+0x180/0x180 [ 943.874933] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 943.880318] ? trace_hardirqs_off_caller+0x6e/0x210 [ 943.885340] ? do_syscall_64+0x21/0x620 [ 943.889317] do_syscall_64+0xf9/0x620 [ 943.893130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.898321] RIP: 0033:0x7f77b0c76669 [ 943.902039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 943.920939] RSP: 002b:00007f77af5c9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 943.928648] RAX: ffffffffffffffda RBX: 00007f77b0d98050 RCX: 00007f77b0c76669 [ 943.935919] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 943.943192] RBP: 00007f77af5c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 943.950458] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 943.957727] R13: 00007ffc70b96cdf R14: 00007f77af5c9300 R15: 0000000000022000 09:26:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket$netlink(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x1) (async) r2 = socket(0x9, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) accept4(r4, 0x0, 0x0, 0x0) (async) r5 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r5, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="00080000000000002e2f66696c65300091d8cefd56d188698ebd9829f64228b8849384"]) (async, rerun: 32) sendmmsg(r4, &(0x7f0000000780)=[{{&(0x7f0000000080)=@ethernet={0x1, @remote}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)="ca61dd44a869a8ff67ce7c039dc27a96a9a8dd832a506f1c4d90fe407a962c83d67920d90416b41863fa1f215f6c8a33ad3fcb5bec2a0b978fc562c1fbd34a66d929455c0d215edb5189056f91f4e6f649f9bbe14b53d320e2d86159ef10404987fd", 0x62}, {&(0x7f0000000840)="76199c2e0e603f614071d58f485f8628ce4fef4462dd63ba53e22a3196589816d2b178afda03d9ed42aa1b6dc0e8248a75fc5eb5c8b70ded4803cacb9b26fe00f0350f4261b087", 0x47}, {&(0x7f00000001c0)="728f357c796a35a8c8c598991c0ef9fc117b9dbd2b6ac3b02ac4d3aaef8dcb0c3ecf4f20d6f0deb57b425fce1965c8bf31d5109fa0dda933b2507f2f", 0x3c}, {&(0x7f0000000300)="50a68ae8d76d3da974f4527b930abbe128a7801833871ff44ac6e2a86f477c61684f971b93ea25c73413d1bed6d671f275270f231f4dc5a7152c8f1062cd5b98c0a6398af7", 0x45}], 0x4}}, {{&(0x7f0000000480)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(seqiv(morus1280))\x00'}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000500)="ba8be1b4a10cb788a5", 0x9}, {&(0x7f0000001900)="e064e69850fb0aa25e358b04e0c6ad4caaec8f2248cc5087b6f457ccac251fbcfd41d2e8b61dc1b935f004e7b4f91932ec7f1db232513cbc2132a80433b902a2f3de0051fcd47bd1b17358c226a3847fb09c46da4637bd8ce09abb5f0d11d5ae7b72ef6d90b798e9d75ad4588d7cf7b1fb3e73e089ab458870f14d47232b81690e4746cff1f87565e2826bd2087d7dd096dcd6b3f0b0b1657575e4ea5011745520ac515430ac04a14cadf0faa032af68376885a2d55cc63e9e30c185c4fa24d74a9429ac850566eb6aeab154085d", 0xce}, {&(0x7f0000000640)="8dc23077e48912701b2864028744be0179325da517f07cdef067f43caa665b816c58e7bdfb5886a1de764e51cd084a4a468d7982848ffd029671516589877bd0422e487694a4734b5d9d5981e4646fc6419637ffcbf6a1f6d242e8cbec9fb5e980184c089021d86e4e54ff07d55885bc202d5c7d8e3d66c7b8c26d66f5b5d6ed5ab72a9658e29c308dc5e2c895357965a6e640962783105f007c93c16700e6eec5faed3673fe0e027389e2", 0xab}, {&(0x7f0000000900)="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", 0x1000}], 0x4, &(0x7f0000000740)}}], 0x2, 0x800) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4800000024001d0f00"/20, @ANYRES32=r3, @ANYBLOB="00b12d5c0d1f9e6c78fc2f47b500f0962f5cf6ffff4710133ae91b44a200689b0eb4fb0c2b479c000200030000004000"], 0x48}}, 0x0) 09:26:17 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3d00000000000000) 09:26:17 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb601000000000000) 09:26:17 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xce01000000000000) 09:26:17 executing program 5: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) (async, rerun: 32) r1 = getpgid(0x0) (rerun: 32) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4050c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) (async, rerun: 32) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async, rerun: 32) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x8) (async, rerun: 32) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (rerun: 32) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) [ 944.090557] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 944.252230] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 944.266728] xt_CT: You must specify a L4 protocol and not use inversions on it 09:26:18 executing program 3: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(0x0, 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) (fail_nth: 4) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:18 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3d01000000000000) 09:26:18 executing program 5: r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 09:26:18 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xcf00000000000000) 09:26:18 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb700000000000000) 09:26:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket$netlink(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x1) r2 = socket(0x9, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r2) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x0, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) accept4(r4, 0x0, 0x0, 0x0) (async) r5 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x1) sendto$inet6(r5, &(0x7f0000000780)="0f9f221bc02e219b1357dfbf932d97438172a7b971cd5e1f0d5c12cf9c01c1c7e5a708e23706a29f48fa604511d9a7d7ba5e51ae691848da4100f658494af2d5da897ac77ab2ab8ee06759cf34c2c0e02f30b691123d590c5c814b0ba2b4a0d13dcbf9ce11a39f661a2c94300ec0", 0x6e, 0x4000801, &(0x7f0000000800)={0xa, 0x4e24, 0xef, @private2, 0x101}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="00080000000000002e2f66696c65300091d8cefd56d188698ebd9829f64228b8849384"]) sendmmsg(r4, &(0x7f0000000780)=[{{&(0x7f0000000080)=@ethernet={0x1, @remote}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)="ca61dd44a869a8ff67ce7c039dc27a96a9a8dd832a506f1c4d90fe407a962c83d67920d90416b41863fa1f215f6c8a33ad3fcb5bec2a0b978fc562c1fbd34a66d929455c0d215edb5189056f91f4e6f649f9bbe14b53d320e2d86159ef10404987fd", 0x62}, {&(0x7f0000000840)="76199c2e0e603f614071d58f485f8628ce4fef4462dd63ba53e22a3196589816d2b178afda03d9ed42aa1b6dc0e8248a75fc5eb5c8b70ded4803cacb9b26fe00f0350f4261b087", 0x47}, {&(0x7f00000001c0)="728f357c796a35a8c8c598991c0ef9fc117b9dbd2b6ac3b02ac4d3aaef8dcb0c3ecf4f20d6f0deb57b425fce1965c8bf31d5109fa0dda933b2507f2f", 0x3c}, {&(0x7f0000000300)="50a68ae8d76d3da974f4527b930abbe128a7801833871ff44ac6e2a86f477c61684f971b93ea25c73413d1bed6d671f275270f231f4dc5a7152c8f1062cd5b98c0a6398af7", 0x45}], 0x4}}, {{&(0x7f0000000480)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(seqiv(morus1280))\x00'}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000500)="ba8be1b4a10cb788a5", 0x9}, {&(0x7f0000001900)="e064e69850fb0aa25e358b04e0c6ad4caaec8f2248cc5087b6f457ccac251fbcfd41d2e8b61dc1b935f004e7b4f91932ec7f1db232513cbc2132a80433b902a2f3de0051fcd47bd1b17358c226a3847fb09c46da4637bd8ce09abb5f0d11d5ae7b72ef6d90b798e9d75ad4588d7cf7b1fb3e73e089ab458870f14d47232b81690e4746cff1f87565e2826bd2087d7dd096dcd6b3f0b0b1657575e4ea5011745520ac515430ac04a14cadf0faa032af68376885a2d55cc63e9e30c185c4fa24d74a9429ac850566eb6aeab154085d", 0xce}, {&(0x7f0000000640)="8dc23077e48912701b2864028744be0179325da517f07cdef067f43caa665b816c58e7bdfb5886a1de764e51cd084a4a468d7982848ffd029671516589877bd0422e487694a4734b5d9d5981e4646fc6419637ffcbf6a1f6d242e8cbec9fb5e980184c089021d86e4e54ff07d55885bc202d5c7d8e3d66c7b8c26d66f5b5d6ed5ab72a9658e29c308dc5e2c895357965a6e640962783105f007c93c16700e6eec5faed3673fe0e027389e2", 0xab}, {&(0x7f0000000900)="3822d0cdbb3f0fd313d86036b02586e6d44c3978dc27890e48175b3145d6e16ac07bb149979b153a2661d42aada25effbd59eb78ec7b2eadf4d75bf052aa28536da4aaf8ba1f4ec6fce666f5591fe0081ed35c10c76ab0702a9c95ae85fef8eb26aeea5c12514ed567c7eb5d88321bed0d7e334e43fd45f599af9141e723139aacac28f740bf2a3801fa9630f2e25c88e972f1c6a6ad0aa38447c8781ac1ac06e9e31fda4adc61ba6ba75e2f5c30575556e5ee50b9574d919eb62261524b994738768fbaa344a492e9d7d216743f0ba542ecaa2ae7e75e42de737e4167245dc3953ad3f20725a0fb41d2bb92a6a976e2e066f4c92e0ce7ae3904b7cd28b8e024fe28c1adb00af72d34fe075b3ddbd2ffcab73f82000d7ccbf44680656a6a2729d9b24c8a75b1a25bc0bb701d58e95b611a5cc18c8fcf58a11bc11d3438be780c7a2f495808a31318844fabb47dcfa2d94fab188a816564d737ed34ad1985a04917651a2b01c0e01652ac0768b7027cc88202849d4dc302b34bdcacd6ae9aa6710dbacf877ff001e74147a08be219d27cd21531cacd9d8668d632bb1cf5ec0633d37e9c9e4cab13f60e6ef91d81771b4eb276a650522f65732a87d0c231e3751657d0184bf6d147c9708e1e169efcb1f5c9a4ce77779e9c2a34c84d2067414856ef887924ad6b775c4575e4d0a6f1abd894d8691c699cca14469f7015138a0de6a821fc2bc8fa0388a50b469f991558960d7f400eb6412cd09b82520663133358bcebe49cff8e4ae292ad09eecc5f1ffe17336a7720ce933f8b4d8052e6ed1ed5c6c1430223b75269001c3db0f59fbf5efb3f29368f7ca2211bf8d88d6d4baddafc1f79d4ca903878b09823e5d2a06b749550ddf7528bce282eaddd4d3f996d3d43334c1b3962fe29151f0759780c9964caf832bc02ae9df6be9d37f2360a6d40217c0debe91c64824f3d27153bd5f524072f8e6409fd1b3d92a31d7f1c796241fc9cd3b8a1a105cd3b16e459f54cd183958a1f5b483bc6e17801d0053ab1975ea1f19c0f36a2d69e24caf93f03c3ca32c9e14f20d1b70ffba40dedff9153f894bbb4b3b3f8ca5635bca5cecc456be064cb9772b682158ca23fc86d99eb335c900d9c39e3525ad316a76d98c7466eb876446715cb845ed1295511ee70122922b538eb26729dc1c9d41147e026fc5ccfff3bba8a710f0a658c6eb8ea6669d5c4be86bdedda4187aad62022541669404a78923ca279e1465c2dbf30fd8d4ffaca4427e2da53a8f5e68fe49ecb35379afa889a05c0dcea920319ea32533f18f019149314513b6015c622456951b5c2d8e3bcec3a068e514ef39b6f83ea419adc1f0d8a215a9024e9146ee99a0bd5829942e444813a207ba45550aae7ec92f49cbdde3d64119f4b4a220728188db21f0c2e6973d3bc69adbc0badd0e0e6ee2c0af69db1657f9bcbe4ae1d6a9e2b6f76ada1aa0b620406e25e3e81bd8c67ffb0bb823734e3e26887cadefc315ede0c959c282635db13b181ef8407def48eff098fc4a8febe8bc237fbbb169f3ae19562bd01b78ea107900e67d51074815cf3b10942782137e6536c13930a97b457837bc26cd13ec7cba41b6e5746597229b7299d98076377d8a1082c28efdac81ec9ed6ff8e178925afa213c3472dd65f1b123566fc049dd08e3933dfb043528e348dfd84f1454bd4ae1b70337e11a1df7bf0070b3e0db660ed01f8ac6a3349368bde10551b45d6719ad1bf311421cc7e84a6eefd68618909c738379ce6b6fb141649f8e0088d77021144de940e1a45f0bc3bc8c4d4fe580bfa685113e5aeaf8f522c3212efdcc3fca8898e72240c0871d47e8d9ef9e47df1aa6a7e72b7997a1e65d4c813e17c2543f2ba44eab57fe016419be2dfbca18d1eb4953588ea9d1d73492c3d3c18e894ede5c7a46f75f248c3973e85a52bc6b4155005a659d91b6424ea25f926e0d0f93ee6869f8b5d2d3054e43b6d853796e78ab1efeef84ffb3f13a7026e213dd6e78435d00da567e00c93930f20f2431cc9f04f7bceb1146b9bd8ced0ef355ab7bd44f17eef9c969bc1f8e4d1ea397d5d242988c6861d957046f3461ff4be8461c7ee0f0167bb785d43121b8b8ac4a789738bbc1a20183f6e1e8fd1fe56977708bd96c87058693b99dc3f05a55b8a2939c29ab812a140b854bf614ce9ca0483a89ec0e10f479acaeded53a8ffee22eb91f27cfee72ac550cdbcc5da0e12bbe33208200964bfd38d5618434daf9095f7b7cd4f38b75c756d36f8bb38326ec966e9ed43b98065e055f89b8c5609cb97072f309eaaa41286461fd4ffcb0208a055e1f7048385e99e65a1e1d42fe5ee1caa3f1f2fc763248f5e631b111e3e0dffe885581292c0d83f663f342f143ffeb8a129bfa3b7a58bbf0f5b9e25e9beef3c7b3d3d32f135e91fc85c716b13df6506c76e36128bb2b8104611e14a30a0f8b74d59c9ee6b4fac0a832ca2d265efe97524cbdf41fe81c3f6a924ef3fa0e27b18dc20bf133dcfed674605bd29a2175552ac14d93bd00c4018ac8e1810bcf33a4cdf751e70a638461f626a342b5153e508024a098bc2e9abb1de04247931c944f978c2138d4ebe284ef71d4c417cc8fb7b1d7c3bcf583101a68a786a3e8d468f99237eb9de84174b6a8fb337b4f6f0f733c7cee5d7ac1a944b9ef587edb8982cbb73db2bd918291646925e91b97e5890f284d3d3917ef208a127efc047b8e7f9cf98cf7301ea0c5dd9ff3e895cbcf10dba9165a40cb7d859b2dc83a28d4b417c17914607a56b5c14f1a1582f25546f641b032f428d48a78fb23b2c716b910d0645e7c0ad1ca91b3e154d7666c5759e36204e24e48bce5a37fbf5c24049e4d401274c1c5005220c273be6b5b8723ed1e4ce2596210e8efc80f1c2e1ee7bfa814ca00a5959cababf98d6a46e870ce2a72ca799f39e97373c55eb9fa95d7a3b56027969ca28088d3a95140f11263ff4bc8dec82ec4dcfa76ed657ad059d1e3fc3507283cb03044fb0aa4d3066a77fe3e8c0b8d2e61971f1356803bf3f14849ec0f58aec568fd6d6f3a56f297c4920dd96cb184d76482ac032fe77044f146bb7810484348cf3dd062ed585f740231de7498df187560ebbc94671bb10f7e9b18f1bca74947eb95d9d1db8afab6810089706e88346d1d4a2498dd26b118647ea276d0fc9fcfa33d6033235f5641d0091417f19a084f6e0648fcd9a8c8858978503738e1eb59647774c9689ae2b39e15489d39cb2510bc007baadcb369774dba2312e1e5ffb52d91234780c495e444cf24b6f98141e306be58d72cfeee895b8b7bdeb5e7a0163d1f9d6e346d918428bc36a24db3735391c269a51314e48fe50d7227fc55a1d320f7b9f84d61c6d5a2f4f259525fc876d06d3108fc946db587764631e25902de166cfaa4754ca6df36a75d873c907c4e5e252b072a583734de58aea229033ea510386d8f881e58440809124a30c11f0705c5c0e17c5500e617eb05476d2a170412492c314a1016e48ace0a2865f82437a466568316947a52355c8a0b3b26c5e62bafcdb6fc464b9a33fc632c86f949dd09ba2c81bd36dd52454b9894b4ea26ff808da60dda789cb01a54486112e2f8459a30f4fa6496631ddb73ca5f5eb3e0868b13b63cfaf6c8eb69a30119549118f4de011b9c43a3765cfbfedff51b57fd4bb5d14f0cb881d555f5b2e55e40bacaee5ef90441edf4c9b689c60977b5c2753953e3e32c18d180401608fa9173deae03e408e781086a8fe4bc629c072352055e137c192a9666db552656a1b9fc5cf93cc889dfbf022e473bb6da5dbdafd22c1fcfe6f8d5596b4a4a98dea37781f23202810aaf5bf502efb216ec05475259fed0374ac0ca85505c6b5d15299153fb59789c325c82b18503072cd3ba1a8013bd8c3412d591da092c3fe44336f6bdbffd2969d8b3fd9d6d8b3de0ef757474c942191ada1d1ad91daadf8324bf3074cd6087ea3c210e288c881b4b334604085b2ae4da7301d0845f4ce41e64e439e89320fdd1b0ab9362ab0f2d6a0c19d116f361bb313f343ffb99e546660f16d08f23a76c51fdcd28b480065fce45e91e402c132f66d3c36ddbd0a768ccd1644343dad3313ace8ebfe08248cdfa391bdb777294dc95074f68459d4fd4b3e118958865360b1c6b53462985f036e1a13557a19d73375c66f7142c94b26ff7ed7caa702326bee2388b0cea3dfa2f570b05a0cc22c652fa3a03fdbcbbd791a7084557a71acfcf3d6852bc5ff205e4e2a4470beb56da6fe496d6d1cf57643aaf8a5bf7aafd611cb15f19ffe9113e0b9793e560fafb650e62d7673b1cf6b29346f33aa63694d048dedbbb9970da04c2cb896c2d5a8bd172d0176d6b1e3e7012e9565babfc2c92cf4a31f71765feb18241a870205fad794cad9e66a8daae46432ace39a0cb60d06a755ec0f175d9eb2b91fea4cbbbb62327f9f80ba8a1503121b316a7fb013971ae5f5acd28033fed83db9631c2f623605e44f00b89b6a86db270fb536f6d8f6672ddb0a4930bbbfa4ad292d634ec85b1ebdc6b770cc7fedbe5e8c70076116c8cd23161a8e508f64a3b360164326ce65c7aa2c565a4dd6a7e1138529c787f7b26aa5be1bb0b674ca094f4430f69aaac78e24c5793e8233b482b3b835e4367e592a2f8c456d80016931b140c470ac9d71c3002aa34726b335cd6ea3a0a67522dfee61911325d3d0ba9c87f4b3b8cff356408929ea541eacc4562d8f41bbf28b4036ea52d9a1ff122469de5a470dcbfbab9c7e11fc2d120913d96c5779f2de05dd6e324609c031565eb26329f42ad6a0e79eb4493789a0f1fb96f50512f18981b3e0e641b073334296c7c54f91aaf562b1d4c22602b528750230be7c0cf19551721310eef836e35c5d6d8be8acd6963ce4b97b111efa02cf102605ae963665794f203e9aa942c8dcd5da92bd2e541a2259bf2a6f4ce83b5af5e160d9a44a70d40179648308445262637784a532d13ea1357bbb2ab4901a9b72053750cd998cee0b8954e9f9dbd6e13722acd70da00e1db1cef09f0d8836db3858b0891b7b82df095ff698eb71eb06562b3e2efdad7891880f9201c0eef19159d50d0c5a3e2a6cf04a271e55b0534efb127061f0007150223e8047bff6977565df627409b1ad921d66b26fb1face35e9dd42aabd89929456c39bb8c9bb8fac7f9311a6c4678423b5658c6002de87413e284f9bc7e89a36a8e0f25d2862672a53c55d2afa517dce9fb677d1978905138d265b458e02fc7cf63ced074975e1c7b0800a6f82a99c93439c1f572036579181c945ffeb41f1c7abcebfbf453367dbeef11bfd2cde77a13d3fa4d731cd2c3a3333aad3f5d3bca6d9e5b8654ba3aee94d8a8749ec39ba35186346c563e55bda302f3e64c40c51d7fcc9501c6ac64bb49f95bf1cee6ec6c6dad4d50b1d5e179b7efbc8c6cc3249e896a37c4ce3394882e769a057f685a52afc2dbdbdc28763bb9a99193e02e4e8f1fb250f905cd7e417d1becab656368eca8a51cac5b54ff800a7271026f4b65f1f652d9165b6e8adf3f35870f34122ac7272c854aeee9d9c4a38f787d55f845ada643e8f76c4217b5ba75ba78147ca73ea7d8333cc0f17849b94322f9438c65d196b0dc8740ea99228fcf98dd5386c18d9db3872e6d78adc307a23ba0e9a694a7431f7e546e0c138532886de58e174c3b5a88200603288860e93b430bda822412975ff65b78c6a323e6af1bfa7d59b352eb9fac4b0ac2ef00c46c973342082669efe937465cf66a47bf045cdc4ab2985a0f82b5", 0x1000}], 0x4, &(0x7f0000000740)}}], 0x2, 0x800) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4800000024001d0f00"/20, @ANYRES32=r3, @ANYBLOB="00b12d5c0d1f9e6c78fc2f47b500f0962f5cf6ffff4710133ae91b44a200689b0eb4fb0c2b479c000200030000004000"], 0x48}}, 0x0) 09:26:18 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3e00000000000000) 09:26:18 executing program 2: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb701000000000000) 09:26:18 executing program 0: open(0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xcf01000000000000) [ 944.748359] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 944.778602] xt_CT: You must specify a L4 protocol and not use inversions on it [ 944.782265] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 09:26:18 executing program 5: r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) ftruncate(r2, 0x2007ffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) faccessat(0xffffffffffffffff, 0x0, 0x0) sendfile(r5, r3, 0x0, 0x800100020046) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) (async) getpgid(0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x3f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, r1, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x70) (async) ftruncate(r2, 0x2007ffb) (async) sendfile(r0, r0, 0x0, 0x8080fffffffe) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) open(&(0x7f0000000180)='./file0\x00', 0x62000, 0x0) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, '\x00', '\x00', "20040100"}, 0x28) (async) faccessat(0xffffffffffffffff, 0x0, 0x0) (async) sendfile(r5, r3, 0x0, 0x800100020046) (async) syz_clone(0x1008000, 0x0, 0x4e, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) (async) 09:26:18 executing program 4: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0xb601000000000000) 09:26:18 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x200000) pread64(r0, &(0x7f0000000000)=""/42, 0xfffffdef, 0x3e01000000000000) [ 944.935463] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 944.986780] FAULT_INJECTION: forcing a failure. [ 944.986780] name failslab, interval 1, probability 0, space 0, times 0 [ 945.039563] CPU: 0 PID: 23860 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 945.047483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 945.056845] Call Trace: [ 945.059453] dump_stack+0x1fc/0x2ef [ 945.063095] should_fail.cold+0xa/0xf [ 945.066909] ? setup_fault_attr+0x200/0x200 [ 945.071254] ? lock_acquire+0x170/0x3c0 [ 945.075249] __should_failslab+0x115/0x180 [ 945.079492] should_failslab+0x5/0x10 [ 945.083298] __kmalloc+0x2ab/0x3c0 [ 945.086839] ? tls_push_record+0xff/0x1370 [ 945.091078] tls_push_record+0xff/0x1370 [ 945.095145] ? sk_alloc_sg+0x5d8/0x850 [ 945.099047] tls_sw_sendpage+0x8c6/0xd00 [ 945.103121] ? tls_sw_sendmsg+0x1210/0x1210 [ 945.107441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.112197] ? rcu_nmi_exit+0xb3/0x180 [ 945.116088] ? tls_sw_sendmsg+0x1210/0x1210 [ 945.120417] inet_sendpage+0x164/0x650 [ 945.124309] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 945.128899] ? inet_accept+0x770/0x770 [ 945.132781] sock_sendpage+0xdf/0x140 [ 945.136605] pipe_to_sendpage+0x268/0x330 [ 945.140762] ? sockfs_setattr+0x160/0x160 [ 945.145034] ? direct_splice_actor+0x160/0x160 [ 945.149631] __splice_from_pipe+0x389/0x800 [ 945.153967] ? direct_splice_actor+0x160/0x160 [ 945.158568] generic_splice_sendpage+0xd4/0x140 [ 945.163237] ? __splice_from_pipe+0x800/0x800 [ 945.167735] ? retint_kernel+0x2d/0x2d [ 945.171630] ? security_file_permission+0x1c0/0x220 [ 945.176652] ? __splice_from_pipe+0x800/0x800 [ 945.181160] direct_splice_actor+0x115/0x160 [ 945.185577] splice_direct_to_actor+0x33f/0x8d0 [ 945.190258] ? generic_pipe_buf_nosteal+0x10/0x10 [ 945.195109] ? do_splice_to+0x160/0x160 [ 945.199110] do_splice_direct+0x1a7/0x270 [ 945.203271] ? splice_direct_to_actor+0x8d0/0x8d0 [ 945.208127] ? security_file_permission+0x1c0/0x220 [ 945.213157] do_sendfile+0x550/0xc30 [ 945.216885] ? do_compat_pwritev64+0x1b0/0x1b0 [ 945.221474] ? vfs_write+0x393/0x540 [ 945.225195] __se_sys_sendfile64+0x147/0x160 [ 945.229611] ? __se_sys_sendfile+0x180/0x180 [ 945.234034] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 945.239406] ? trace_hardirqs_off_caller+0x6e/0x210 [ 945.244427] ? do_syscall_64+0x21/0x620 [ 945.248402] do_syscall_64+0xf9/0x620 [ 945.252214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.257404] RIP: 0033:0x7f77b0c76669 [ 945.261120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 945.280037] RSP: 002b:00007f77af5c9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 945.287757] RAX: ffffffffffffffda RBX: 00007f77b0d98050 RCX: 00007f77b0c76669 [ 945.295024] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 945.302288] RBP: 00007f77af5c91d0 R08: 0000000000000000 R09: 0000000000000000 [ 945.309559] R10: 0000800100020046 R11: 0000000000000246 R12: 0000000000000001 [ 945.316830] R13: 00007ffc70b96cdf R14: 00007f77af5c9300 R15: 0000000000022000 [ 945.334103] kauditd_printk_skb: 12 callbacks suppressed [ 945.334117] audit: type=1804 audit(1663925179.113:2921): pid=23868 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1516/bus" dev="sda1" ino=13998 res=1 [ 945.365924] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 945.443696] audit: type=1804 audit(1663925179.223:2922): pid=23874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1516/bus" dev="sda1" ino=13998 res=1 [ 945.500255] audit: type=1804 audit(1663925179.263:2923): pid=23877 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir234707158/syzkaller.78eB0s/1516/bus" dev="sda1" ino=13998 res=1 [ 945.612122] audit: type=1804 audit(1663925179.383:2924): pid=23871 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir1496328603/syzkaller.xeag9M/419/bus" dev="sda1" ino=14008 res=1 [ 945.702684] kasan: CONFIG_KASAN_INLINE enabled [ 945.707714] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 945.723628] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 945.729896] CPU: 0 PID: 23860 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 945.737783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 945.747150] RIP: 0010:scatterwalk_copychunks+0x4db/0x6a0 [ 945.752591] Code: ff df 80 3c 02 00 0f 85 98 01 00 00 49 8d 44 24 08 4d 89 26 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 9f 01 00 00 48 b8 00 00 00 00 [ 945.771483] RSP: 0018:ffff888057f37238 EFLAGS: 00010202 [ 945.776853] RAX: dffffc0000000000 RBX: 000000000000401d RCX: ffffc9000b430000 [ 945.784124] RDX: 0000000000000001 RSI: ffffffff83739e63 RDI: 0000000000000007 [ 945.791395] RBP: 000000000000401d R08: 0000000000000001 R09: 0000000000000000 [ 945.798661] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 945.805925] R13: 0000000000001000 R14: ffff888057f372e8 R15: 0000000000000001 [ 945.813198] FS: 00007f77af5c9700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 945.821421] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 945.827302] CR2: 0000001b3322d000 CR3: 00000000a5bb8000 CR4: 00000000003406f0 [ 945.834572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 945.841840] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 945.849100] Call Trace: [ 945.851698] scatterwalk_map_and_copy+0x121/0x1a0 [ 945.856538] ? scatterwalk_ffwd+0x370/0x370 [ 945.860859] ? aesni_gcm_enc_avx2+0x196/0x1b0 [ 945.865350] ? kernel_fpu_enable+0x1f/0x40 [ 945.869586] ? kernel_fpu_end+0x11b/0x170 [ 945.873731] ? kernel_fpu_enable+0x40/0x40 [ 945.877978] gcmaes_encrypt.constprop.0+0x89f/0xd90 [ 945.883017] ? gcmaes_crypt_by_sg.constprop.0+0x1790/0x1790 [ 945.888746] ? inet_sendpage+0x164/0x650 [ 945.892806] ? sock_sendpage+0xdf/0x140 [ 945.896781] ? pipe_to_sendpage+0x268/0x330 [ 945.901103] ? __splice_from_pipe+0x389/0x800 [ 945.905595] ? generic_splice_sendpage+0xd4/0x140 [ 945.910440] ? direct_splice_actor+0x115/0x160 [ 945.915043] ? splice_direct_to_actor+0x33f/0x8d0 [ 945.919886] ? do_splice_direct+0x1a7/0x270 [ 945.924331] ? do_sendfile+0x550/0xc30 [ 945.928240] ? __se_sys_sendfile64+0x147/0x160 [ 945.932825] ? do_syscall_64+0xf9/0x620 [ 945.936799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.942162] ? mark_held_locks+0xa6/0xf0 [ 945.946236] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.951009] ? mark_held_locks+0xa6/0xf0 [ 945.955069] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.959825] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.964634] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 945.969234] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.974001] ? generic_gcmaes_encrypt+0x108/0x160 [ 945.978949] ? generic_gcmaes_encrypt+0x108/0x160 [ 945.983790] ? helper_rfc4106_encrypt+0x310/0x310 [ 945.988683] ? gcmaes_wrapper_encrypt+0x67/0x1f0 [ 945.993446] ? gcmaes_wrapper_encrypt+0x157/0x1f0 [ 945.998292] ? tls_push_record+0x9d7/0x1370 [ 946.002616] ? tls_sw_sendpage+0x8c6/0xd00 [ 946.006862] ? tls_sw_sendmsg+0x1210/0x1210 [ 946.011192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 946.015951] ? rcu_nmi_exit+0xb3/0x180 [ 946.019850] ? tls_sw_sendmsg+0x1210/0x1210 [ 946.024174] ? inet_sendpage+0x164/0x650 [ 946.028237] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 946.032821] ? inet_accept+0x770/0x770 [ 946.036706] ? sock_sendpage+0xdf/0x140 [ 946.040681] ? pipe_to_sendpage+0x268/0x330 [ 946.045004] ? sockfs_setattr+0x160/0x160 [ 946.049155] ? direct_splice_actor+0x160/0x160 [ 946.053741] ? __splice_from_pipe+0x389/0x800 [ 946.058242] ? direct_splice_actor+0x160/0x160 [ 946.062826] ? generic_splice_sendpage+0xd4/0x140 [ 946.067673] ? __splice_from_pipe+0x800/0x800 [ 946.072173] ? retint_kernel+0x2d/0x2d [ 946.076069] ? security_file_permission+0x1c0/0x220 [ 946.081086] ? __splice_from_pipe+0x800/0x800 [ 946.085580] ? direct_splice_actor+0x115/0x160 [ 946.090163] ? splice_direct_to_actor+0x33f/0x8d0 [ 946.095015] ? generic_pipe_buf_nosteal+0x10/0x10 [ 946.099871] ? do_splice_to+0x160/0x160 [ 946.103849] ? do_splice_direct+0x1a7/0x270 [ 946.108174] ? splice_direct_to_actor+0x8d0/0x8d0 [ 946.113021] ? security_file_permission+0x1c0/0x220 [ 946.118043] ? do_sendfile+0x550/0xc30 [ 946.121933] ? do_compat_pwritev64+0x1b0/0x1b0 [ 946.126541] ? vfs_write+0x393/0x540 [ 946.130258] ? __se_sys_sendfile64+0x147/0x160 [ 946.134848] ? __se_sys_sendfile+0x180/0x180 [ 946.139261] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 946.144630] ? trace_hardirqs_off_caller+0x6e/0x210 [ 946.149651] ? do_syscall_64+0x21/0x620 [ 946.153633] ? do_syscall_64+0xf9/0x620 [ 946.157615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.162970] Modules linked in: [ 946.170494] ---[ end trace 364798898a04f70e ]--- [ 946.176048] RIP: 0010:scatterwalk_copychunks+0x4db/0x6a0 [ 946.181560] Code: ff df 80 3c 02 00 0f 85 98 01 00 00 49 8d 44 24 08 4d 89 26 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 9f 01 00 00 48 b8 00 00 00 00 [ 946.200838] RSP: 0018:ffff888057f37238 EFLAGS: 00010202 [ 946.206610] RAX: dffffc0000000000 RBX: 000000000000401d RCX: ffffc9000b430000 [ 946.214316] RDX: 0000000000000001 RSI: ffffffff83739e63 RDI: 0000000000000007 [ 946.221843] RBP: 000000000000401d R08: 0000000000000001 R09: 0000000000000000 [ 946.229934] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 946.237299] R13: 0000000000001000 R14: ffff888057f372e8 R15: 0000000000000001 [ 946.244680] FS: 00007f77af5c9700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 946.253103] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 946.259003] CR2: 00007f0eeb286000 CR3: 00000000a5bb8000 CR4: 00000000003406f0 [ 946.266332] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 946.273679] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 946.280945] Kernel panic - not syncing: Fatal exception [ 946.286449] Kernel Offset: disabled [ 946.290064] Rebooting in 86400 seconds..