= creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:15 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 531.087187][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:17 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:17 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:17 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:17 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:17 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:17 executing program 4: open(0x0, 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 532.216537][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 532.234062][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:17 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 532.274936][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:17 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(0x0, 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:18 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:18 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(0x0, 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:19 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:19 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(0x0, 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:19 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:19 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:19 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:19 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:19 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 534.969981][ C1] net_ratelimit: 8 callbacks suppressed [ 534.969992][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 534.992450][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 535.084815][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 535.106149][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 535.122055][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:20 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:20 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:20 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 535.658605][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:20 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:20 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 536.068680][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:21 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:21 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:21 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 536.463788][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:22 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:22 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:22 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:22 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x0) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:22 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:22 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 537.646808][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 537.705975][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:23 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:23 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:23 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x0) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:23 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:23 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:23 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:25 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:25 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x0) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:25 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:25 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:25 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:25 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 540.231777][ C1] net_ratelimit: 5 callbacks suppressed [ 540.231788][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 540.261119][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:25 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 540.295036][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 540.317483][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 540.476469][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:25 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:25 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:26 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:26 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 541.007036][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 541.197676][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:26 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:27 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:27 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:27 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:27 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:27 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:27 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 542.771133][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 542.818331][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 542.844900][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:28 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:28 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(0xffffffffffffffff, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:28 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:28 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:28 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:29 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:30 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:30 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:30 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:30 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:30 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:30 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 545.592927][ C0] net_ratelimit: 4 callbacks suppressed [ 545.592962][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:30 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 545.668827][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 545.684849][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 545.741912][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 545.753690][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:31 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:31 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:31 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 546.283896][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:31 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:31 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 546.951814][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 547.133644][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:33 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:33 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:33 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:33 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:33 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:33 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 548.957871][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 549.010788][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:34 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:35 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:35 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:35 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:35 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 551.042204][ C1] net_ratelimit: 7 callbacks suppressed [ 551.042220][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 551.080382][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:36 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:36 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:36 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:36 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:36 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 551.786336][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 551.857759][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 551.902615][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:37 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:37 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:37 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 552.471397][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:37 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:37 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:38 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:38 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:38 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 553.028405][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 553.138843][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:38 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:38 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 553.388859][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:38 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:38 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 553.668414][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:38 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:39 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:40 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:40 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:40 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:40 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:40 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:40 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:40 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:40 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:41 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:41 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:41 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 556.485349][ C0] net_ratelimit: 5 callbacks suppressed [ 556.485360][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:41 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:41 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:41 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:41 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:41 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 556.775465][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:41 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:42 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:42 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:42 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 557.034704][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:42 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 557.206203][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:42 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 557.386482][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 557.521347][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:42 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:42 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:43 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:43 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:43 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:43 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 558.158280][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 558.313417][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:43 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:43 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:43 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:43 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 558.768660][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:43 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:43 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 558.840368][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:43 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:44 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:44 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:44 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:44 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:45 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:45 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:45 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:45 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:45 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:46 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:46 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:46 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 561.649648][ C1] net_ratelimit: 10 callbacks suppressed [ 561.649664][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:46 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 561.769761][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 561.809623][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:47 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:47 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 562.215640][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 562.274156][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:47 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 562.678994][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 562.984155][ T1233] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.990745][ T1233] ieee802154 phy1 wpan1: encryption failed: -22 22:12:48 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 563.226735][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:48 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 563.938915][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:49 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 564.419305][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:49 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 564.723694][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:49 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:49 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:49 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:51 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:51 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:51 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:51 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:51 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 566.874800][ C0] net_ratelimit: 7 callbacks suppressed [ 566.874811][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 566.906030][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:52 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:52 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:52 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 567.289854][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 567.337064][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 567.357089][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:53 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:53 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 568.807778][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 568.884310][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 568.890886][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:54 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:54 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 569.180134][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:54 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 569.382960][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:55 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:55 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:56 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:56 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:56 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:56 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:56 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:56 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:56 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 571.914466][ C1] net_ratelimit: 8 callbacks suppressed [ 571.914483][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 572.064778][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 572.077914][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:57 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 572.402806][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:57 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:57 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 572.928807][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 573.077278][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:58 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:12:58 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 573.794872][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 573.967515][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:59 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 574.346515][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:12:59 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:12:59 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 574.846159][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:00 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:00 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:00 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:00 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:00 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:01 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:01 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:02 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:02 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 577.239924][ C0] net_ratelimit: 7 callbacks suppressed [ 577.239943][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:02 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:02 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:02 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:02 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 577.839019][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:02 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:02 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:03 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 577.991941][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:03 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 578.051517][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 578.087862][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:03 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 578.364551][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:03 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:03 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:04 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:04 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:05 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 580.392103][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:05 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:05 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 580.596996][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:05 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:05 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:05 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:05 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:05 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 580.888454][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 580.925330][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:06 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:06 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:06 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:07 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:07 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:07 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:07 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:07 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 582.611026][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 582.781097][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:08 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:08 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:08 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:08 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 583.149627][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 583.283910][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:08 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:09 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:09 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:09 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 584.625592][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 584.652038][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:09 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:10 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:10 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:10 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:10 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:10 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 585.590577][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:10 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 585.716338][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 585.759700][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:10 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 585.921424][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:11 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:12 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:12 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:12 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:12 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:12 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:12 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:12 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 587.870339][ C0] net_ratelimit: 3 callbacks suppressed [ 587.870356][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 587.899538][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:12 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 587.914638][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 588.052605][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:13 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:13 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 588.578061][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 588.726786][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:15 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 590.595772][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:15 executing program 1: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:15 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:15 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:15 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:15 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 590.762392][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 590.891527][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 590.978631][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:16 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:17 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:17 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:17 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:18 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:18 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:18 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:18 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:18 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 593.552865][ C0] net_ratelimit: 4 callbacks suppressed [ 593.552881][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 593.633970][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 593.657085][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:18 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:18 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:18 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 593.819203][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 593.931860][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 593.959831][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:19 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 594.197034][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:19 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:19 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:20 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 594.978417][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:20 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:20 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:20 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:20 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:20 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 595.781877][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 595.861323][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:21 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:21 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:21 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:22 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:22 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:22 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:22 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:23 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:24 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 599.191554][ C0] net_ratelimit: 10 callbacks suppressed [ 599.191572][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:24 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 599.476323][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:24 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:24 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:24 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:24 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 599.897684][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:25 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 599.946945][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 599.965577][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 600.048208][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 600.118382][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:25 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:25 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:25 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 600.660288][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 600.732510][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 600.784117][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:26 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:26 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:27 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:27 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:27 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:27 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:28 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:28 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:28 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:28 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:29 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:29 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 604.555971][ C1] net_ratelimit: 10 callbacks suppressed [ 604.555986][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:29 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:29 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 604.804367][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 604.931386][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:30 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 605.294195][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:30 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:30 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 605.604505][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 605.714796][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:31 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 606.296174][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:31 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:31 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:32 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 606.949533][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:32 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 607.050760][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:32 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 607.210164][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:32 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:33 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:33 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:34 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:34 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:34 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:34 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 609.964284][ C0] net_ratelimit: 6 callbacks suppressed [ 609.964300][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 610.059412][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 610.075429][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:35 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 610.523183][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:35 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:35 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 610.812903][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 610.909110][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:36 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:36 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:36 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 611.433345][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 611.489181][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 611.589061][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:37 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:37 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 612.353941][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:37 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:37 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:38 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:38 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:39 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:39 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:39 executing program 5: open(0x0, 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:39 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 615.150828][ C1] net_ratelimit: 7 callbacks suppressed [ 615.150839][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 615.204953][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:40 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:40 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 615.835435][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:41 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 616.054877][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 616.288408][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:41 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 616.656960][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:42 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:42 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 617.316011][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 617.487172][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:42 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r2, r0, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 617.987965][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:44 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:13:44 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:44 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 619.281859][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:44 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:44 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:45 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 620.289938][ C1] net_ratelimit: 4 callbacks suppressed [ 620.289986][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:45 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(0xffffffffffffffff) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r2, r0, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 620.876743][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:46 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 621.287381][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:46 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 621.653900][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:46 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:47 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 622.003917][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:47 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 622.133003][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:47 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 622.315155][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 622.319990][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:47 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:47 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 622.859009][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 623.012335][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:48 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:48 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:48 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:48 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 624.425619][ T1233] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.432292][ T1233] ieee802154 phy1 wpan1: encryption failed: -22 22:13:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:50 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:50 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:50 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 625.544156][ C0] net_ratelimit: 5 callbacks suppressed [ 625.544171][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 625.657650][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:50 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 626.131293][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:51 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 626.680027][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:51 executing program 1: open(0x0, 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:51 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:52 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 627.094560][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 627.284582][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:52 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 627.502446][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:52 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 627.949505][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:54 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:54 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 629.381547][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 629.405087][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:54 executing program 2: open(0x0, 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:55 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:55 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 630.557164][ C1] net_ratelimit: 1 callbacks suppressed [ 630.557182][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:55 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 630.750711][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 631.064271][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:57 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:13:57 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, 0x0, 0x0) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 632.551315][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 632.765709][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:58 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 633.309208][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:58 executing program 5: r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 633.883722][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:13:59 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 634.369334][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:00 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 635.245065][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:00 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:00 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 635.794019][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 636.151040][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:01 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:01 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 636.946285][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 637.154544][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:02 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:02 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 637.603152][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 637.769961][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:03 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 638.374912][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:04 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 639.208410][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:04 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 639.965305][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:05 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:05 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 640.412802][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:06 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r2, r0, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 641.136084][ C1] net_ratelimit: 2 callbacks suppressed [ 641.136098][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:06 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, &(0x7f0000000000)='0', 0xfffffd2c) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 641.674420][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:07 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 642.199522][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:07 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 642.924587][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:08 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r2, r0, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 643.347033][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:08 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:08 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 643.810622][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 643.894387][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 644.071583][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:10 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) write$6lowpan_enable(0xffffffffffffffff, &(0x7f0000000000)='0', 0xfffffd2c) r0 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r2, r0, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:10 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 645.183295][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 645.330302][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:10 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:11 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 646.547526][ C0] net_ratelimit: 1 callbacks suppressed [ 646.547545][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 646.635158][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:12 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 647.411109][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:12 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:12 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 647.877009][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 648.087340][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:13 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 648.370310][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:13 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:13 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 648.916306][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 648.981882][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 649.620122][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:15 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 650.685657][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:16 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:16 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:16 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:14:16 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:14:16 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 652.101055][ C0] net_ratelimit: 2 callbacks suppressed [ 652.101076][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:17 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:14:17 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:17 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 652.862811][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 652.874095][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:19 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:19 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:14:19 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 654.334090][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:19 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:19 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:19 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 654.874830][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 654.909042][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:20 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:14:20 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 656.140982][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:21 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 656.604200][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:22 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:22 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:22 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 657.890294][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 658.017452][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:23 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:23 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:23 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 658.587015][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 658.659250][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 658.681359][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:25 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 660.357325][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:25 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:25 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:25 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 660.984521][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 661.098502][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 661.135288][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:26 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:14:27 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) [ 662.313391][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:28 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 663.795052][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:28 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 664.131489][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:29 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) 22:14:29 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:29 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 664.505407][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 664.564361][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 664.641913][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:29 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 664.960766][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:31 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:31 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 666.232122][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 666.468729][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:32 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 667.459905][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:32 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 668.160271][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:33 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 668.958466][ C1] net_ratelimit: 2 callbacks suppressed [ 668.958483][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:35 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 670.640928][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:35 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 670.958201][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:36 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 671.314772][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:36 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 671.917091][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:37 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(0xffffffffffffffff, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 672.641457][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:37 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 673.099262][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:38 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 673.584560][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:39 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, 0x0, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r3, 0x208200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800100020013) 22:14:39 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) 22:14:39 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 674.491600][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 674.522849][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:39 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(0x0, 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) [ 674.695192][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 674.755763][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:39 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 675.096743][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 675.230400][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:40 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) [ 675.652317][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:40 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) 22:14:41 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) [ 676.046305][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 676.227111][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:41 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:14:41 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 676.523770][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:42 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 679.657208][ C0] net_ratelimit: 5 callbacks suppressed [ 679.657226][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:44 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 679.997249][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:45 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 680.814975][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:45 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 681.127894][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 681.453953][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:47 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 682.226446][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:47 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 682.972819][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 683.134582][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:48 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 683.545891][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 684.229681][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:49 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:49 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040), 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) 22:14:50 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 685.217400][ C0] net_ratelimit: 1 callbacks suppressed [ 685.217429][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 685.864636][ T1233] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.871810][ T1233] ieee802154 phy1 wpan1: encryption failed: -22 22:14:51 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 686.163029][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:51 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r0 = dup(0xffffffffffffffff) write$6lowpan_enable(r0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) 22:14:51 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 686.575192][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:51 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 686.927199][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:52 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 687.060647][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:52 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) ftruncate(0xffffffffffffffff, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 687.214827][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 687.297588][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:53 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 688.347574][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:54 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 689.966479][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:55 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) [ 690.071223][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 690.263928][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 690.309694][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:55 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x0, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) [ 690.944125][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:56 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:14:57 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) [ 691.996359][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 692.021113][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 692.190338][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:58 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:14:58 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) [ 693.271841][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 693.354093][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:59 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:14:59 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) 22:14:59 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 694.365498][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 694.389552][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:14:59 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:00 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 695.889248][ C1] net_ratelimit: 2 callbacks suppressed [ 695.889267][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:01 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 696.292558][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 696.468448][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:02 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 697.421276][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:02 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) [ 697.837558][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:03 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 698.468074][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:03 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:15:04 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) [ 699.112401][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:04 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 699.392059][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 699.485945][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:04 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 699.743176][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:05 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:05 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:07 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 702.268403][ C0] net_ratelimit: 2 callbacks suppressed [ 702.268423][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:07 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:07 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 702.856497][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 702.977208][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:08 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 703.199351][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 703.394123][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:09 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 704.978959][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:10 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) [ 705.988367][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:11 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 706.138148][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 706.299846][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 706.389478][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:12 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:15:12 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) [ 707.741631][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 707.838563][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:13 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) [ 709.046250][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:14 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:14 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) [ 709.631248][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:14 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) [ 709.869914][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:15 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) [ 709.950240][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 709.977824][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:15 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 710.214380][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 710.348763][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:16 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:15:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 711.268675][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:16 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:17 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) 22:15:17 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:17 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) [ 712.898446][ C1] net_ratelimit: 3 callbacks suppressed [ 712.898464][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 713.027429][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:18 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) 22:15:18 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) [ 713.995490][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 714.050243][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:19 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) [ 714.962823][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:20 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 22:15:20 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) [ 715.189099][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 715.234842][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:20 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) [ 715.804231][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:21 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 716.177590][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:21 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 716.687073][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:22 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 22:15:23 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 718.660489][ C1] net_ratelimit: 1 callbacks suppressed [ 718.660507][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:24 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 719.219741][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:24 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 720.123746][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:25 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) 22:15:25 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) 22:15:25 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) 22:15:25 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001340)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) 22:15:25 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001340)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) [ 720.831765][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 720.923611][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 720.999978][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:26 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) [ 721.540432][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:28 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 723.175596][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:28 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x8, &(0x7f0000000100)={[0x9]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendfile(r3, r2, &(0x7f0000000200)=0x9, 0x5) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) ftruncate(r5, 0x208200) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @local, 0x100}, 0x1c) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) [ 723.913428][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:29 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x4, &(0x7f00000000c0)=0x6, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000001180)=0x80, 0x4) dup(0xffffffffffffffff) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) r3 = syz_open_dev$dri(0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(r0, &(0x7f0000000000)="02", 0x35a63c) dup(0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r4 = open_tree(0xffffffffffffff9c, 0x0, 0x0) signalfd(r3, &(0x7f00000002c0)={[0x89]}, 0x8) openat$vsock(0xffffff9c, &(0x7f0000000300), 0x103080, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) sendfile(r5, r4, &(0x7f0000000080)=0xe9a, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) 22:15:29 executing program 1: r0 = fsopen(&(0x7f0000000180)='devpts\x00', 0x1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000200)={{}, 0x4, 0x9, 0x100}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="640000000000000000000000000000009500000000000000fea0f7fa5339e48badd98e51435b86b976f3b0eb05b9437bf31dd0ff607c9e0da1e30e3943b451ea6e138f1d88cd6045429826c8fee8a8fcca63f31efc0b398474b1068a00bf805ca9a1539fc3aa225a7dd06a9b7c5c99dc691f83e61aaacb48bcdd8fd613e184ccb135f62e4dd04360ce260124428aa8e4ab39eb945ca35a06aabdf9fb4fd7638212d1b480380134a57fc8281b78ab624d675186e00affe82cb3c6d9db62f545"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="1c000000100001040037528296ea8a35f97e7484ffcf83efca323a6422887bd5f017a4665083d7c619c0fb57ff3c5b3bad7296c5219e9f1d6e132434755022f7f70ef74405479620b9c87890e1664a1ed66786200759dd14f382ae370121c7e0e06c15ef3f40f19f80806ce818f298cb91a6931644ed0dd7747d847c8dfd761b64be3a441f06937ba3f171d65a857848f2e8af7235f265f8786122771da7af10a03966600683d100"/184, @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5800000024000b0e000000000000000000080000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000fe0008000100736662002c00020028000100bf1803cae2dcc2fa"], 0x58}}, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x128}}, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r8, &(0x7f0000000400), &(0x7f00000006c0)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000280)=@ipmr_delroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) bind$packet(r7, &(0x7f00000000c0)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r7, &(0x7f0000000100)="0503460008003e00000002008100", 0x36, 0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = syz_open_dev$vcsn(&(0x7f0000000280), 0x2, 0x400000) sendmsg$nl_route(r13, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@ipmr_delroute={0xe8, 0x19, 0x500, 0x70bd2a, 0x25dfdbfd, {0x80, 0x10, 0x10, 0x1f, 0xfd, 0x0, 0xc8, 0x4, 0x200}, [@RTA_METRICS={0xc2, 0x8, 0x0, 0x1, "5ee8af26401e38218bc8c563d43e9a9f30ed15d725e6463dd0ddb38ced6176f03d36dd37e250a15ab6a5575fe09f4bf20e4b43843dbeb947bfbf7d1d07b3fb2904600539440bdda8431acaef89a2a1b46c9275422623c60732e9fd141fb9142f3ded7a2e65b82c431d610ea7d3eb53699661e0a1d6e95fbe0baa3e81909c6521de03732c992b7b7bf427e0d04f6318146973d991cbc57dc5f3337947e7d1fddb2c7b5aafb885d8e2f52825af001adca546cd155bd6fe23ee90e441f6710e"}, @RTA_FLOW={0x8, 0xb, 0xfff}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40080}, 0x24000090) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlinkprop={0x34, 0x6c, 0x800, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r12, 0x380, 0x2100}, [@IFLA_PHYS_SWITCH_ID={0xc, 0x24, "225589d9d03572ad"}, @IFLA_OPERSTATE={0x5, 0x10, 0xb9}]}, 0x34}}, 0x20000010) 22:15:29 executing program 3: r0 = fsopen(&(0x7f0000000180)='devpts\x00', 0x1) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000200)={{}, 0x4, 0x9, 0x100}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="640000000000000000000000000000009500000000000000fea0f7fa5339e48badd98e51435b86b976f3b0eb05b9437bf31dd0ff607c9e0da1e30e3943b451ea6e138f1d88cd6045429826c8fee8a8fcca63f31efc0b398474b1068a00bf805ca9a1539fc3aa225a7dd06a9b7c5c99dc691f83e61aaacb48bcdd8fd613e184ccb135f62e4dd04360ce260124428aa8e4ab39eb945ca35a06aabdf9fb4fd7638212d1b480380134a57fc8281b78ab624d675186e00affe82cb3c6d9db62f545"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = creat(&(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="1c000000100001040037528296ea8a35f97e7484ffcf83efca323a6422887bd5f017a4665083d7c619c0fb57ff3c5b3bad7296c5219e9f1d6e132434755022f7f70ef74405479620b9c87890e1664a1ed66786200759dd14f382ae370121c7e0e06c15ef3f40f19f80806ce818f298cb91a6931644ed0dd7747d847c8dfd761b64be3a441f06937ba3f171d65a857848f2e8af7235f265f8786122771da7af10a03966600683d100"/184, @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5800000024000b0e000000000000000000080000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000fe0008000100736662002c00020028000100bf1803cae2dcc2fa"], 0x58}}, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x128}}, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) r10 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r8, &(0x7f0000000400), &(0x7f00000006c0)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000280)=@ipmr_delroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x80, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}, 0x1c}}, 0x0) bind$packet(r7, &(0x7f00000000c0)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @multicast}, 0x14) sendto$inet6(r7, &(0x7f0000000100)="0503460008003e00000002008100", 0x36, 0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = syz_open_dev$vcsn(&(0x7f0000000280), 0x2, 0x400000) sendmsg$nl_route(r13, &(0x7f0000000680)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@ipmr_delroute={0xe8, 0x19, 0x500, 0x70bd2a, 0x25dfdbfd, {0x80, 0x10, 0x10, 0x1f, 0xfd, 0x0, 0xc8, 0x4, 0x200}, [@RTA_METRICS={0xc2, 0x8, 0x0, 0x1, "5ee8af26401e38218bc8c563d43e9a9f30ed15d725e6463dd0ddb38ced6176f03d36dd37e250a15ab6a5575fe09f4bf20e4b43843dbeb947bfbf7d1d07b3fb2904600539440bdda8431acaef89a2a1b46c9275422623c60732e9fd141fb9142f3ded7a2e65b82c431d610ea7d3eb53699661e0a1d6e95fbe0baa3e81909c6521de03732c992b7b7bf427e0d04f6318146973d991cbc57dc5f3337947e7d1fddb2c7b5aafb885d8e2f52825af001adca546cd155bd6fe23ee90e441f6710e"}, @RTA_FLOW={0x8, 0xb, 0xfff}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40080}, 0x24000090) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlinkprop={0x34, 0x6c, 0x800, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r12, 0x380, 0x2100}, [@IFLA_PHYS_SWITCH_ID={0xc, 0x24, "225589d9d03572ad"}, @IFLA_OPERSTATE={0x5, 0x10, 0xb9}]}, 0x34}}, 0x20000010) 22:15:30 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 1) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:30 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 1) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 725.277412][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 725.306568][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 725.380061][T14723] FAULT_INJECTION: forcing a failure. [ 725.380061][T14723] name failslab, interval 1, probability 0, space 0, times 1 [ 725.397011][T14723] CPU: 1 PID: 14723 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 725.407487][T14723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 725.417579][T14723] Call Trace: [ 725.420877][T14723] [ 725.423832][T14723] dump_stack_lvl+0x125/0x1b0 [ 725.428632][T14723] should_fail_ex+0x496/0x5b0 [ 725.433409][T14723] should_failslab+0x9/0x20 [ 725.438165][T14723] __kmem_cache_alloc_node+0x2fd/0x350 [ 725.443664][T14723] ? alloc_pipe_info+0x10f/0x580 [ 725.448675][T14723] kmalloc_trace+0x25/0xe0 [ 725.453135][T14723] alloc_pipe_info+0x10f/0x580 [ 725.457960][T14723] splice_direct_to_actor+0x78b/0xa30 [ 725.463394][T14723] ? folio_flags.constprop.0+0x150/0x150 [ 725.469101][T14723] ? apparmor_file_permission+0x21f/0x4f0 [ 725.475157][T14723] ? vfs_splice_read+0x3b0/0x3b0 [ 725.480145][T14723] ? bpf_lsm_file_permission+0x9/0x10 [ 725.485590][T14723] ? security_file_permission+0x94/0x100 [ 725.491382][T14723] do_splice_direct+0x1af/0x280 [ 725.496317][T14723] ? splice_direct_to_actor+0xa30/0xa30 [ 725.501933][T14723] ? propagate_umount+0x1af0/0x1af0 [ 725.507199][T14723] ? bpf_lsm_file_permission+0x9/0x10 [ 725.512615][T14723] ? security_file_permission+0x94/0x100 [ 725.518326][T14723] do_sendfile+0xb88/0x1390 [ 725.522917][T14723] ? bit_wait_timeout+0x160/0x160 [ 725.528075][T14723] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 725.533434][T14723] __x64_sys_sendfile64+0x1d6/0x220 [ 725.538696][T14723] ? ksys_write+0x1a7/0x250 [ 725.543237][T14723] ? __ia32_sys_sendfile+0x220/0x220 [ 725.548530][T14723] ? syscall_enter_from_user_mode+0x26/0x80 [ 725.554426][T14723] do_syscall_64+0x38/0xb0 [ 725.558835][T14723] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 725.564780][T14723] RIP: 0033:0x7f376ce7cae9 [ 725.569189][T14723] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 725.588794][T14723] RSP: 002b:00007f376dc9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 725.597221][T14723] RAX: ffffffffffffffda RBX: 00007f376cf9c050 RCX: 00007f376ce7cae9 [ 725.605197][T14723] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 725.613176][T14723] RBP: 00007f376dc9c120 R08: 0000000000000000 R09: 0000000000000000 [ 725.621142][T14723] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 725.629248][T14723] R13: 000000000000006e R14: 00007f376cf9c050 R15: 00007f376d0bfa48 [ 725.637259][T14723] [ 725.705511][T14724] FAULT_INJECTION: forcing a failure. [ 725.705511][T14724] name failslab, interval 1, probability 0, space 0, times 1 [ 725.797581][T14724] CPU: 0 PID: 14724 Comm: syz-executor.5 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 725.808060][T14724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 725.818153][T14724] Call Trace: [ 725.821427][T14724] [ 725.824364][T14724] dump_stack_lvl+0x125/0x1b0 [ 725.829046][T14724] should_fail_ex+0x496/0x5b0 [ 725.833736][T14724] should_failslab+0x9/0x20 [ 725.838274][T14724] __kmem_cache_alloc_node+0x2fd/0x350 [ 725.843746][T14724] ? alloc_pipe_info+0x10f/0x580 [ 725.848700][T14724] kmalloc_trace+0x25/0xe0 [ 725.853151][T14724] alloc_pipe_info+0x10f/0x580 [ 725.858081][T14724] ? preempt_schedule_irq+0x79/0x90 [ 725.863994][T14724] splice_direct_to_actor+0x78b/0xa30 [ 725.869378][T14724] ? asm_sysvec_reschedule_ipi+0x1a/0x20 [ 725.875036][T14724] ? folio_flags.constprop.0+0x150/0x150 [ 725.880691][T14724] ? apparmor_file_permission+0x21f/0x4f0 [ 725.886411][T14724] ? vfs_splice_read+0x3b0/0x3b0 [ 725.891448][T14724] ? bpf_lsm_file_permission+0x9/0x10 [ 725.896817][T14724] ? security_file_permission+0x94/0x100 [ 725.902459][T14724] do_splice_direct+0x1af/0x280 [ 725.907330][T14724] ? splice_direct_to_actor+0xa30/0xa30 [ 725.912886][T14724] ? propagate_umount+0x1af0/0x1af0 [ 725.918088][T14724] ? bpf_lsm_file_permission+0x9/0x10 [ 725.923455][T14724] ? security_file_permission+0x94/0x100 [ 725.929094][T14724] do_sendfile+0xb88/0x1390 [ 725.933605][T14724] ? rcu_is_watching+0x12/0xb0 [ 725.938402][T14724] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 725.943698][T14724] ? xfd_validate_state+0x5d/0x180 [ 725.949005][T14724] ? restore_fpregs_from_fpstate+0xc1/0x1d0 [ 725.954906][T14724] __x64_sys_sendfile64+0x1d6/0x220 [ 725.960109][T14724] ? ksys_write+0x1a7/0x250 [ 725.964613][T14724] ? __ia32_sys_sendfile+0x220/0x220 [ 725.969903][T14724] ? syscall_enter_from_user_mode+0x26/0x80 [ 725.975809][T14724] do_syscall_64+0x38/0xb0 [ 725.980222][T14724] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 725.986119][T14724] RIP: 0033:0x7f64d1c7cae9 [ 725.990525][T14724] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 726.010139][T14724] RSP: 002b:00007f64d07fe0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 726.018636][T14724] RAX: ffffffffffffffda RBX: 00007f64d1d9c050 RCX: 00007f64d1c7cae9 [ 726.026863][T14724] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 726.034826][T14724] RBP: 00007f64d07fe120 R08: 0000000000000000 R09: 0000000000000000 [ 726.043047][T14724] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 726.051025][T14724] R13: 000000000000006e R14: 00007f64d1d9c050 R15: 00007f64d1ebfa48 [ 726.059015][T14724] 22:15:31 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 1) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:15:31 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 1) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 726.966693][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 726.988294][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 727.036118][T14733] FAULT_INJECTION: forcing a failure. [ 727.036118][T14733] name failslab, interval 1, probability 0, space 0, times 0 [ 727.056152][T14734] FAULT_INJECTION: forcing a failure. [ 727.056152][T14734] name failslab, interval 1, probability 0, space 0, times 0 [ 727.169773][T14734] CPU: 1 PID: 14734 Comm: syz-executor.1 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 727.180429][T14734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 727.190504][T14734] Call Trace: [ 727.193953][T14734] [ 727.196962][T14734] dump_stack_lvl+0x125/0x1b0 [ 727.201647][T14734] should_fail_ex+0x496/0x5b0 [ 727.206617][T14734] should_failslab+0x9/0x20 [ 727.211121][T14734] __kmem_cache_alloc_node+0x2fd/0x350 [ 727.216598][T14734] ? alloc_pipe_info+0x10f/0x580 [ 727.221574][T14734] kmalloc_trace+0x25/0xe0 [ 727.226021][T14734] alloc_pipe_info+0x10f/0x580 [ 727.230824][T14734] splice_direct_to_actor+0x78b/0xa30 [ 727.236233][T14734] ? folio_flags.constprop.0+0x150/0x150 [ 727.241903][T14734] ? apparmor_file_permission+0x21f/0x4f0 [ 727.247646][T14734] ? vfs_splice_read+0x3b0/0x3b0 [ 727.252634][T14734] ? bpf_lsm_file_permission+0x9/0x10 [ 727.258038][T14734] ? security_file_permission+0x94/0x100 [ 727.263722][T14734] do_splice_direct+0x1af/0x280 [ 727.268650][T14734] ? splice_direct_to_actor+0xa30/0xa30 [ 727.274404][T14734] ? propagate_umount+0x1af0/0x1af0 [ 727.279633][T14734] ? bpf_lsm_file_permission+0x9/0x10 [ 727.285110][T14734] ? security_file_permission+0x94/0x100 [ 727.290814][T14734] do_sendfile+0xb88/0x1390 [ 727.295379][T14734] ? bit_wait_timeout+0x160/0x160 [ 727.300435][T14734] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 727.305763][T14734] __x64_sys_sendfile64+0x1d6/0x220 [ 727.310993][T14734] ? ksys_write+0x1a7/0x250 [ 727.315527][T14734] ? __ia32_sys_sendfile+0x220/0x220 [ 727.320849][T14734] ? syscall_enter_from_user_mode+0x26/0x80 [ 727.326780][T14734] do_syscall_64+0x38/0xb0 [ 727.331220][T14734] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 727.337147][T14734] RIP: 0033:0x7f43d487cae9 [ 727.341579][T14734] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 727.361209][T14734] RSP: 002b:00007f43d562d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 22:15:32 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 1) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 727.369645][T14734] RAX: ffffffffffffffda RBX: 00007f43d499bf80 RCX: 00007f43d487cae9 [ 727.377718][T14734] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 727.385707][T14734] RBP: 00007f43d562d120 R08: 0000000000000000 R09: 0000000000000000 [ 727.393700][T14734] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 727.401689][T14734] R13: 000000000000000b R14: 00007f43d499bf80 R15: 00007f43d4abfa48 [ 727.409690][T14734] 22:15:32 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) (fail_nth: 1) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 727.517019][T14733] CPU: 1 PID: 14733 Comm: syz-executor.2 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 727.527491][T14733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 727.537565][T14733] Call Trace: [ 727.540873][T14733] [ 727.543838][T14733] dump_stack_lvl+0x125/0x1b0 [ 727.548569][T14733] should_fail_ex+0x496/0x5b0 [ 727.553285][T14733] should_failslab+0x9/0x20 [ 727.557850][T14733] __kmem_cache_alloc_node+0x2fd/0x350 [ 727.563366][T14733] ? alloc_pipe_info+0x10f/0x580 [ 727.568361][T14733] kmalloc_trace+0x25/0xe0 [ 727.572793][T14733] alloc_pipe_info+0x10f/0x580 [ 727.577582][T14733] splice_direct_to_actor+0x78b/0xa30 [ 727.582969][T14733] ? folio_flags.constprop.0+0x150/0x150 [ 727.588617][T14733] ? apparmor_file_permission+0x21f/0x4f0 [ 727.594344][T14733] ? vfs_splice_read+0x3b0/0x3b0 [ 727.599294][T14733] ? bpf_lsm_file_permission+0x9/0x10 [ 727.604691][T14733] ? security_file_permission+0x94/0x100 [ 727.610341][T14733] do_splice_direct+0x1af/0x280 [ 727.615229][T14733] ? splice_direct_to_actor+0xa30/0xa30 [ 727.620824][T14733] ? propagate_umount+0x1af0/0x1af0 [ 727.626087][T14733] ? bpf_lsm_file_permission+0x9/0x10 [ 727.631502][T14733] ? security_file_permission+0x94/0x100 [ 727.637152][T14733] do_sendfile+0xb88/0x1390 [ 727.641666][T14733] ? rcu_is_watching+0x12/0xb0 [ 727.646441][T14733] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 727.651737][T14733] ? xfd_validate_state+0x5d/0x180 [ 727.656943][T14733] ? restore_fpregs_from_fpstate+0xc1/0x1d0 [ 727.662847][T14733] __x64_sys_sendfile64+0x1d6/0x220 [ 727.668058][T14733] ? ksys_write+0x1a7/0x250 [ 727.672577][T14733] ? __ia32_sys_sendfile+0x220/0x220 [ 727.677894][T14733] ? syscall_enter_from_user_mode+0x26/0x80 [ 727.683792][T14733] do_syscall_64+0x38/0xb0 [ 727.688218][T14733] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 727.694156][T14733] RIP: 0033:0x7f2752e7cae9 [ 727.698573][T14733] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 727.718182][T14733] RSP: 002b:00007f2753c220c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 727.726593][T14733] RAX: ffffffffffffffda RBX: 00007f2752f9c050 RCX: 00007f2752e7cae9 [ 727.734571][T14733] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 727.742547][T14733] RBP: 00007f2753c22120 R08: 0000000000000000 R09: 0000000000000000 [ 727.750525][T14733] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 727.758492][T14733] R13: 000000000000006e R14: 00007f2752f9c050 R15: 00007f27530bfa48 [ 727.766474][T14733] [ 727.899554][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 727.959972][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 728.042743][T14742] FAULT_INJECTION: forcing a failure. [ 728.042743][T14742] name failslab, interval 1, probability 0, space 0, times 0 [ 728.108267][T14746] FAULT_INJECTION: forcing a failure. [ 728.108267][T14746] name failslab, interval 1, probability 0, space 0, times 0 [ 728.133240][T14742] CPU: 0 PID: 14742 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 728.143692][T14742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 728.153753][T14742] Call Trace: [ 728.157035][T14742] [ 728.159956][T14742] dump_stack_lvl+0x125/0x1b0 [ 728.164637][T14742] should_fail_ex+0x496/0x5b0 [ 728.169312][T14742] should_failslab+0x9/0x20 [ 728.173816][T14742] __kmem_cache_alloc_node+0x2fd/0x350 [ 728.179274][T14742] ? alloc_pipe_info+0x10f/0x580 [ 728.184219][T14742] kmalloc_trace+0x25/0xe0 [ 728.188636][T14742] alloc_pipe_info+0x10f/0x580 [ 728.193419][T14742] splice_direct_to_actor+0x78b/0xa30 [ 728.198801][T14742] ? folio_flags.constprop.0+0x150/0x150 [ 728.204444][T14742] ? apparmor_file_permission+0x21f/0x4f0 [ 728.210173][T14742] ? vfs_splice_read+0x3b0/0x3b0 [ 728.215128][T14742] ? bpf_lsm_file_permission+0x9/0x10 [ 728.220503][T14742] ? security_file_permission+0x94/0x100 [ 728.226150][T14742] do_splice_direct+0x1af/0x280 [ 728.231006][T14742] ? splice_direct_to_actor+0xa30/0xa30 [ 728.236559][T14742] ? propagate_umount+0x1af0/0x1af0 [ 728.241767][T14742] ? bpf_lsm_file_permission+0x9/0x10 [ 728.247136][T14742] ? security_file_permission+0x94/0x100 [ 728.252782][T14742] do_sendfile+0xb88/0x1390 [ 728.257296][T14742] ? bit_wait_timeout+0x160/0x160 [ 728.262323][T14742] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 728.267620][T14742] __x64_sys_sendfile64+0x1d6/0x220 [ 728.273019][T14742] ? ksys_write+0x1a7/0x250 [ 728.277520][T14742] ? __ia32_sys_sendfile+0x220/0x220 [ 728.282811][T14742] ? syscall_enter_from_user_mode+0x26/0x80 [ 728.288710][T14742] do_syscall_64+0x38/0xb0 [ 728.293123][T14742] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 728.299014][T14742] RIP: 0033:0x7f7d8967cae9 [ 728.303425][T14742] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 728.323029][T14742] RSP: 002b:00007f7d8a3b20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 728.331436][T14742] RAX: ffffffffffffffda RBX: 00007f7d8979bf80 RCX: 00007f7d8967cae9 [ 728.339401][T14742] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000006 [ 728.347407][T14742] RBP: 00007f7d8a3b2120 R08: 0000000000000000 R09: 0000000000000000 22:15:33 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 2) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 728.355373][T14742] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 728.363339][T14742] R13: 000000000000000b R14: 00007f7d8979bf80 R15: 00007f7d898bfa48 [ 728.371314][T14742] 22:15:33 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 2) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:33 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 2) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 728.589463][T14746] CPU: 0 PID: 14746 Comm: syz-executor.3 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 728.599943][T14746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 728.609999][T14746] Call Trace: [ 728.613281][T14746] [ 728.616219][T14746] dump_stack_lvl+0x125/0x1b0 [ 728.620914][T14746] should_fail_ex+0x496/0x5b0 [ 728.625633][T14746] should_failslab+0x9/0x20 [ 728.630235][T14746] __kmem_cache_alloc_node+0x2fd/0x350 [ 728.635698][T14746] ? alloc_pipe_info+0x10f/0x580 [ 728.640654][T14746] kmalloc_trace+0x25/0xe0 [ 728.645098][T14746] alloc_pipe_info+0x10f/0x580 [ 728.649893][T14746] splice_direct_to_actor+0x78b/0xa30 [ 728.655327][T14746] ? folio_flags.constprop.0+0x150/0x150 [ 728.661022][T14746] ? apparmor_file_permission+0x21f/0x4f0 [ 728.666758][T14746] ? vfs_splice_read+0x3b0/0x3b0 [ 728.671705][T14746] ? bpf_lsm_file_permission+0x9/0x10 [ 728.677077][T14746] ? security_file_permission+0x94/0x100 [ 728.682726][T14746] do_splice_direct+0x1af/0x280 [ 728.687592][T14746] ? splice_direct_to_actor+0xa30/0xa30 [ 728.693145][T14746] ? propagate_umount+0x1af0/0x1af0 [ 728.698354][T14746] ? bpf_lsm_file_permission+0x9/0x10 [ 728.703725][T14746] ? security_file_permission+0x94/0x100 [ 728.709370][T14746] do_sendfile+0xb88/0x1390 [ 728.713906][T14746] ? bit_wait_timeout+0x160/0x160 [ 728.718946][T14746] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 728.724245][T14746] __x64_sys_sendfile64+0x1d6/0x220 [ 728.729447][T14746] ? ksys_write+0x1a7/0x250 [ 728.733952][T14746] ? __ia32_sys_sendfile+0x220/0x220 [ 728.739244][T14746] ? syscall_enter_from_user_mode+0x26/0x80 [ 728.745160][T14746] do_syscall_64+0x38/0xb0 [ 728.749747][T14746] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 728.755652][T14746] RIP: 0033:0x7fa32867cae9 [ 728.760098][T14746] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 728.779742][T14746] RSP: 002b:00007fa3293480c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 728.788157][T14746] RAX: ffffffffffffffda RBX: 00007fa32879c1f0 RCX: 00007fa32867cae9 [ 728.796132][T14746] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 728.804192][T14746] RBP: 00007fa329348120 R08: 0000000000000000 R09: 0000000000000000 [ 728.812167][T14746] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 728.820152][T14746] R13: 000000000000006e R14: 00007fa32879c1f0 R15: 00007fa3288bfa48 [ 728.828153][T14746] [ 728.859713][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 728.867498][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 728.889240][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 728.911190][T14752] FAULT_INJECTION: forcing a failure. [ 728.911190][T14752] name failslab, interval 1, probability 0, space 0, times 0 [ 728.934542][T14753] FAULT_INJECTION: forcing a failure. [ 728.934542][T14753] name failslab, interval 1, probability 0, space 0, times 0 [ 728.949532][T14753] CPU: 0 PID: 14753 Comm: syz-executor.5 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 728.959994][T14753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 728.970050][T14753] Call Trace: [ 728.973328][T14753] [ 728.976257][T14753] dump_stack_lvl+0x125/0x1b0 [ 728.980941][T14753] should_fail_ex+0x496/0x5b0 [ 728.985647][T14753] should_failslab+0x9/0x20 [ 728.985690][T14754] FAULT_INJECTION: forcing a failure. [ 728.985690][T14754] name failslab, interval 1, probability 0, space 0, times 0 [ 728.990187][T14753] __kmem_cache_alloc_node+0x2fd/0x350 [ 728.990232][T14753] ? alloc_pipe_info+0x1ed/0x580 [ 729.013292][T14753] ? alloc_pipe_info+0x1ed/0x580 [ 729.018286][T14753] __kmalloc+0x4c/0x100 [ 729.022472][T14753] alloc_pipe_info+0x1ed/0x580 [ 729.027283][T14753] splice_direct_to_actor+0x78b/0xa30 [ 729.032667][T14753] ? folio_flags.constprop.0+0x150/0x150 [ 729.038315][T14753] ? apparmor_file_permission+0x21f/0x4f0 [ 729.044036][T14753] ? vfs_splice_read+0x3b0/0x3b0 [ 729.048982][T14753] ? bpf_lsm_file_permission+0x9/0x10 [ 729.054354][T14753] ? security_file_permission+0x94/0x100 [ 729.060005][T14753] do_splice_direct+0x1af/0x280 [ 729.064872][T14753] ? splice_direct_to_actor+0xa30/0xa30 [ 729.070427][T14753] ? propagate_umount+0x1af0/0x1af0 [ 729.075631][T14753] ? bpf_lsm_file_permission+0x9/0x10 [ 729.081000][T14753] ? security_file_permission+0x94/0x100 [ 729.086645][T14753] do_sendfile+0xb88/0x1390 [ 729.091165][T14753] ? rcu_is_watching+0x12/0xb0 [ 729.095937][T14753] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 729.101228][T14753] ? __do_sys_rseq+0x750/0x750 [ 729.106001][T14753] __x64_sys_sendfile64+0x1d6/0x220 [ 729.111203][T14753] ? ksys_write+0x1a7/0x250 [ 729.115715][T14753] ? __ia32_sys_sendfile+0x220/0x220 [ 729.121008][T14753] ? syscall_enter_from_user_mode+0x26/0x80 [ 729.126905][T14753] do_syscall_64+0x38/0xb0 [ 729.131327][T14753] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 729.137217][T14753] RIP: 0033:0x7f64d1c7cae9 [ 729.141628][T14753] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 22:15:34 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) (fail_nth: 2) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 729.161245][T14753] RSP: 002b:00007f64d07fe0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 729.169664][T14753] RAX: ffffffffffffffda RBX: 00007f64d1d9c050 RCX: 00007f64d1c7cae9 [ 729.177631][T14753] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 729.185598][T14753] RBP: 00007f64d07fe120 R08: 0000000000000000 R09: 0000000000000000 [ 729.193565][T14753] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 729.201530][T14753] R13: 000000000000006e R14: 00007f64d1d9c050 R15: 00007f64d1ebfa48 [ 729.209511][T14753] [ 729.263220][T14754] CPU: 0 PID: 14754 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 729.273693][T14754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 729.283758][T14754] Call Trace: [ 729.287048][T14754] [ 729.289975][T14754] dump_stack_lvl+0x125/0x1b0 [ 729.294665][T14754] should_fail_ex+0x496/0x5b0 [ 729.299369][T14754] should_failslab+0x9/0x20 [ 729.303932][T14754] __kmem_cache_alloc_node+0x2fd/0x350 [ 729.309455][T14754] ? alloc_pipe_info+0x1ed/0x580 [ 729.314455][T14754] ? alloc_pipe_info+0x1ed/0x580 [ 729.319449][T14754] __kmalloc+0x4c/0x100 [ 729.323661][T14754] alloc_pipe_info+0x1ed/0x580 [ 729.328485][T14754] splice_direct_to_actor+0x78b/0xa30 [ 729.333919][T14754] ? folio_flags.constprop.0+0x150/0x150 [ 729.339616][T14754] ? apparmor_file_permission+0x21f/0x4f0 [ 729.345377][T14754] ? vfs_splice_read+0x3b0/0x3b0 [ 729.350368][T14754] ? bpf_lsm_file_permission+0x9/0x10 [ 729.355776][T14754] ? security_file_permission+0x94/0x100 [ 729.361472][T14754] do_splice_direct+0x1af/0x280 [ 729.366378][T14754] ? splice_direct_to_actor+0xa30/0xa30 [ 729.371978][T14754] ? propagate_umount+0x1af0/0x1af0 [ 729.377316][T14754] ? bpf_lsm_file_permission+0x9/0x10 [ 729.382727][T14754] ? security_file_permission+0x94/0x100 [ 729.388420][T14754] do_sendfile+0xb88/0x1390 [ 729.392978][T14754] ? bit_wait_timeout+0x160/0x160 [ 729.398225][T14754] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 729.403579][T14754] __x64_sys_sendfile64+0x1d6/0x220 [ 729.408840][T14754] ? ksys_write+0x1a7/0x250 [ 729.413835][T14754] ? __ia32_sys_sendfile+0x220/0x220 [ 729.419183][T14754] ? syscall_enter_from_user_mode+0x26/0x80 [ 729.425121][T14754] do_syscall_64+0x38/0xb0 [ 729.429543][T14754] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 729.435451][T14754] RIP: 0033:0x7f376ce7cae9 [ 729.439875][T14754] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 729.459490][T14754] RSP: 002b:00007f376dc9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 729.467911][T14754] RAX: ffffffffffffffda RBX: 00007f376cf9c050 RCX: 00007f376ce7cae9 [ 729.475998][T14754] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 729.484054][T14754] RBP: 00007f376dc9c120 R08: 0000000000000000 R09: 0000000000000000 [ 729.492026][T14754] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 729.500005][T14754] R13: 000000000000006e R14: 00007f376cf9c050 R15: 00007f376d0bfa48 [ 729.508005][T14754] [ 729.608928][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 729.623364][T14752] CPU: 0 PID: 14752 Comm: syz-executor.1 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 729.633831][T14752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 729.643892][T14752] Call Trace: [ 729.647171][T14752] [ 729.650105][T14752] dump_stack_lvl+0x125/0x1b0 [ 729.654790][T14752] should_fail_ex+0x496/0x5b0 [ 729.659474][T14752] should_failslab+0x9/0x20 [ 729.663982][T14752] __kmem_cache_alloc_node+0x2fd/0x350 [ 729.669448][T14752] ? alloc_pipe_info+0x1ed/0x580 [ 729.674399][T14752] ? alloc_pipe_info+0x1ed/0x580 [ 729.679342][T14752] __kmalloc+0x4c/0x100 [ 729.683510][T14752] alloc_pipe_info+0x1ed/0x580 [ 729.688304][T14752] splice_direct_to_actor+0x78b/0xa30 [ 729.693689][T14752] ? folio_flags.constprop.0+0x150/0x150 [ 729.699333][T14752] ? apparmor_file_permission+0x21f/0x4f0 [ 729.705057][T14752] ? vfs_splice_read+0x3b0/0x3b0 [ 729.710002][T14752] ? bpf_lsm_file_permission+0x9/0x10 [ 729.715368][T14752] ? security_file_permission+0x94/0x100 [ 729.721016][T14752] do_splice_direct+0x1af/0x280 [ 729.725891][T14752] ? splice_direct_to_actor+0xa30/0xa30 [ 729.731467][T14752] ? propagate_umount+0x1af0/0x1af0 [ 729.736676][T14752] ? bpf_lsm_file_permission+0x9/0x10 [ 729.742095][T14752] ? security_file_permission+0x94/0x100 [ 729.747739][T14752] do_sendfile+0xb88/0x1390 [ 729.752249][T14752] ? bit_wait_timeout+0x160/0x160 [ 729.757275][T14752] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 729.762571][T14752] __x64_sys_sendfile64+0x1d6/0x220 [ 729.767772][T14752] ? ksys_write+0x1a7/0x250 [ 729.772278][T14752] ? __ia32_sys_sendfile+0x220/0x220 [ 729.777568][T14752] ? syscall_enter_from_user_mode+0x26/0x80 [ 729.783465][T14752] do_syscall_64+0x38/0xb0 [ 729.787877][T14752] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 729.793779][T14752] RIP: 0033:0x7f43d487cae9 [ 729.798199][T14752] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 729.817815][T14752] RSP: 002b:00007f43d562d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 729.826226][T14752] RAX: ffffffffffffffda RBX: 00007f43d499bf80 RCX: 00007f43d487cae9 [ 729.834194][T14752] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 729.842333][T14752] RBP: 00007f43d562d120 R08: 0000000000000000 R09: 0000000000000000 [ 729.850296][T14752] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 729.858263][T14752] R13: 000000000000000b R14: 00007f43d499bf80 R15: 00007f43d4abfa48 [ 729.866237][T14752] [ 729.965689][T14758] FAULT_INJECTION: forcing a failure. [ 729.965689][T14758] name failslab, interval 1, probability 0, space 0, times 0 [ 730.088765][T14758] CPU: 0 PID: 14758 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 730.099235][T14758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 730.109299][T14758] Call Trace: [ 730.112579][T14758] [ 730.115505][T14758] dump_stack_lvl+0x125/0x1b0 [ 730.120202][T14758] should_fail_ex+0x496/0x5b0 [ 730.124937][T14758] should_failslab+0x9/0x20 [ 730.129450][T14758] __kmem_cache_alloc_node+0x2fd/0x350 [ 730.134938][T14758] ? alloc_pipe_info+0x1ed/0x580 [ 730.139932][T14758] ? alloc_pipe_info+0x1ed/0x580 [ 730.144887][T14758] __kmalloc+0x4c/0x100 [ 730.149070][T14758] alloc_pipe_info+0x1ed/0x580 [ 730.153867][T14758] splice_direct_to_actor+0x78b/0xa30 [ 730.159289][T14758] ? folio_flags.constprop.0+0x150/0x150 [ 730.164937][T14758] ? apparmor_file_permission+0x21f/0x4f0 [ 730.170660][T14758] ? vfs_splice_read+0x3b0/0x3b0 [ 730.175608][T14758] ? bpf_lsm_file_permission+0x9/0x10 [ 730.180988][T14758] ? security_file_permission+0x94/0x100 [ 730.186636][T14758] do_splice_direct+0x1af/0x280 [ 730.191527][T14758] ? splice_direct_to_actor+0xa30/0xa30 [ 730.197142][T14758] ? propagate_umount+0x1af0/0x1af0 [ 730.202560][T14758] ? bpf_lsm_file_permission+0x9/0x10 [ 730.207945][T14758] ? security_file_permission+0x94/0x100 [ 730.213594][T14758] do_sendfile+0xb88/0x1390 [ 730.218112][T14758] ? bit_wait_timeout+0x160/0x160 [ 730.223145][T14758] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 730.228448][T14758] __x64_sys_sendfile64+0x1d6/0x220 [ 730.233664][T14758] ? ksys_write+0x1a7/0x250 [ 730.238176][T14758] ? __ia32_sys_sendfile+0x220/0x220 [ 730.243475][T14758] ? syscall_enter_from_user_mode+0x26/0x80 [ 730.249379][T14758] do_syscall_64+0x38/0xb0 [ 730.253798][T14758] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 730.259691][T14758] RIP: 0033:0x7f7d8967cae9 [ 730.264104][T14758] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 22:15:35 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 2) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 730.283726][T14758] RSP: 002b:00007f7d8a3b20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 730.292172][T14758] RAX: ffffffffffffffda RBX: 00007f7d8979bf80 RCX: 00007f7d8967cae9 [ 730.300169][T14758] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000006 [ 730.308235][T14758] RBP: 00007f7d8a3b2120 R08: 0000000000000000 R09: 0000000000000000 [ 730.316220][T14758] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 730.324208][T14758] R13: 000000000000000b R14: 00007f7d8979bf80 R15: 00007f7d898bfa48 [ 730.332198][T14758] 22:15:35 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 2) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 730.796584][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:35 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) (fail_nth: 3) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:36 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 3) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 731.005179][T14767] FAULT_INJECTION: forcing a failure. [ 731.005179][T14767] name failslab, interval 1, probability 0, space 0, times 0 [ 731.075954][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 731.097587][T14769] FAULT_INJECTION: forcing a failure. [ 731.097587][T14769] name failslab, interval 1, probability 0, space 0, times 0 [ 731.113133][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 731.137308][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 731.171938][T14772] FAULT_INJECTION: forcing a failure. [ 731.171938][T14772] name failslab, interval 1, probability 0, space 0, times 0 [ 731.188234][T14767] CPU: 0 PID: 14767 Comm: syz-executor.2 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 731.198704][T14767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 731.208799][T14767] Call Trace: [ 731.212098][T14767] [ 731.215042][T14767] dump_stack_lvl+0x125/0x1b0 [ 731.219728][T14767] should_fail_ex+0x496/0x5b0 [ 731.224416][T14767] should_failslab+0x9/0x20 [ 731.228940][T14767] __kmem_cache_alloc_node+0x2fd/0x350 [ 731.234439][T14767] ? alloc_pipe_info+0x1ed/0x580 [ 731.239395][T14767] ? alloc_pipe_info+0x1ed/0x580 [ 731.244345][T14767] __kmalloc+0x4c/0x100 [ 731.248581][T14767] alloc_pipe_info+0x1ed/0x580 [ 731.253388][T14767] splice_direct_to_actor+0x78b/0xa30 [ 731.258782][T14767] ? folio_flags.constprop.0+0x150/0x150 [ 731.264430][T14767] ? apparmor_file_permission+0x21f/0x4f0 [ 731.270180][T14767] ? vfs_splice_read+0x3b0/0x3b0 [ 731.275127][T14767] ? bpf_lsm_file_permission+0x9/0x10 [ 731.280504][T14767] ? security_file_permission+0x94/0x100 [ 731.286159][T14767] do_splice_direct+0x1af/0x280 [ 731.291023][T14767] ? splice_direct_to_actor+0xa30/0xa30 [ 731.296578][T14767] ? propagate_umount+0x1af0/0x1af0 [ 731.301785][T14767] ? bpf_lsm_file_permission+0x9/0x10 [ 731.307175][T14767] ? security_file_permission+0x94/0x100 [ 731.312874][T14767] do_sendfile+0xb88/0x1390 [ 731.317405][T14767] ? bit_wait_timeout+0x160/0x160 [ 731.322565][T14767] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 731.327906][T14767] __x64_sys_sendfile64+0x1d6/0x220 [ 731.333131][T14767] ? ksys_write+0x1a7/0x250 [ 731.337678][T14767] ? __ia32_sys_sendfile+0x220/0x220 [ 731.343007][T14767] ? syscall_enter_from_user_mode+0x26/0x80 [ 731.348919][T14767] do_syscall_64+0x38/0xb0 [ 731.353354][T14767] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 731.359271][T14767] RIP: 0033:0x7f2752e7cae9 [ 731.363681][T14767] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 731.383651][T14767] RSP: 002b:00007f2753be00c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 731.392103][T14767] RAX: ffffffffffffffda RBX: 00007f2752f9c1f0 RCX: 00007f2752e7cae9 [ 731.400076][T14767] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 731.408132][T14767] RBP: 00007f2753be0120 R08: 0000000000000000 R09: 0000000000000000 [ 731.416097][T14767] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 731.424061][T14767] R13: 000000000000006e R14: 00007f2752f9c1f0 R15: 00007f27530bfa48 [ 731.432035][T14767] [ 731.444651][T14772] CPU: 0 PID: 14772 Comm: syz-executor.1 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 731.455133][T14772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 731.465207][T14772] Call Trace: [ 731.468483][T14772] [ 731.471406][T14772] dump_stack_lvl+0x125/0x1b0 [ 731.476089][T14772] should_fail_ex+0x496/0x5b0 [ 731.480795][T14772] should_failslab+0x9/0x20 [ 731.485312][T14772] __kmem_cache_alloc_node+0x2fd/0x350 [ 731.490778][T14772] ? tls_get_rec+0xfa/0x650 [ 731.495375][T14772] ? tls_get_rec+0xfa/0x650 [ 731.499898][T14772] __kmalloc+0x4c/0x100 [ 731.504098][T14772] tls_get_rec+0xfa/0x650 [ 731.508435][T14772] ? __local_bh_enable_ip+0xa4/0x120 [ 731.513756][T14772] tls_sw_sendmsg+0xee1/0x2ba0 [ 731.518528][T14772] ? __lock_acquire+0x182f/0x5de0 [ 731.523570][T14772] ? preempt_count_sub+0x150/0x150 [ 731.528682][T14772] ? tx_work_handler+0x230/0x230 [ 731.533624][T14772] ? aa_sk_perm+0x2c1/0xae0 [ 731.538126][T14772] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 731.544110][T14772] ? aa_af_perm+0x260/0x260 [ 731.548611][T14772] ? __mark_inode_dirty+0x68e/0xd50 [ 731.553815][T14772] ? reacquire_held_locks+0x20b/0x4b0 [ 731.559191][T14772] ? __mark_inode_dirty+0x68e/0xd50 [ 731.564394][T14772] inet6_sendmsg+0x9d/0xe0 [ 731.568865][T14772] ? inet6_compat_ioctl+0x350/0x350 [ 731.574064][T14772] sock_sendmsg+0xd9/0x180 [ 731.578514][T14772] splice_to_socket+0xade/0x1010 [ 731.583479][T14772] ? splice_from_pipe+0x130/0x130 [ 731.588526][T14772] ? atime_needs_update+0x720/0x720 [ 731.593757][T14772] ? shmem_file_read_iter+0xac0/0xac0 [ 731.599238][T14772] ? security_file_permission+0xdc/0x100 [ 731.604957][T14772] ? splice_from_pipe+0x130/0x130 [ 731.610019][T14772] direct_splice_actor+0x118/0x180 [ 731.615141][T14772] splice_direct_to_actor+0x347/0xa30 [ 731.620522][T14772] ? folio_flags.constprop.0+0x150/0x150 [ 731.626174][T14772] ? vfs_splice_read+0x3b0/0x3b0 [ 731.631116][T14772] ? bpf_lsm_file_permission+0x9/0x10 [ 731.636483][T14772] ? security_file_permission+0x94/0x100 [ 731.642122][T14772] do_splice_direct+0x1af/0x280 [ 731.646978][T14772] ? splice_direct_to_actor+0xa30/0xa30 [ 731.652535][T14772] ? propagate_umount+0x1af0/0x1af0 [ 731.657764][T14772] ? bpf_lsm_file_permission+0x9/0x10 [ 731.663132][T14772] ? security_file_permission+0x94/0x100 [ 731.668772][T14772] do_sendfile+0xb88/0x1390 [ 731.673280][T14772] ? bit_wait_timeout+0x160/0x160 [ 731.678304][T14772] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 731.683598][T14772] __x64_sys_sendfile64+0x1d6/0x220 [ 731.688796][T14772] ? ksys_write+0x1a7/0x250 [ 731.693297][T14772] ? __ia32_sys_sendfile+0x220/0x220 [ 731.698586][T14772] ? syscall_enter_from_user_mode+0x26/0x80 [ 731.704485][T14772] do_syscall_64+0x38/0xb0 [ 731.708904][T14772] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 731.714806][T14772] RIP: 0033:0x7f43d487cae9 [ 731.719219][T14772] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 731.738824][T14772] RSP: 002b:00007f43d562d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 731.747256][T14772] RAX: ffffffffffffffda RBX: 00007f43d499bf80 RCX: 00007f43d487cae9 [ 731.755227][T14772] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 731.763198][T14772] RBP: 00007f43d562d120 R08: 0000000000000000 R09: 0000000000000000 [ 731.771164][T14772] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 731.779180][T14772] R13: 000000000000000b R14: 00007f43d499bf80 R15: 00007f43d4abfa48 [ 731.787164][T14772] 22:15:36 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 3) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 731.814326][T14770] FAULT_INJECTION: forcing a failure. [ 731.814326][T14770] name failslab, interval 1, probability 0, space 0, times 0 22:15:36 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 3) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 731.882675][T14769] CPU: 1 PID: 14769 Comm: syz-executor.3 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 731.893164][T14769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 731.903346][T14769] Call Trace: [ 731.906659][T14769] [ 731.909621][T14769] dump_stack_lvl+0x125/0x1b0 [ 731.914347][T14769] should_fail_ex+0x496/0x5b0 [ 731.919170][T14769] should_failslab+0x9/0x20 [ 731.923733][T14769] __kmem_cache_alloc_node+0x2fd/0x350 [ 731.929241][T14769] ? alloc_pipe_info+0x1ed/0x580 [ 731.934238][T14769] ? alloc_pipe_info+0x1ed/0x580 [ 731.939232][T14769] __kmalloc+0x4c/0x100 [ 731.943441][T14769] alloc_pipe_info+0x1ed/0x580 [ 731.948263][T14769] splice_direct_to_actor+0x78b/0xa30 [ 731.953698][T14769] ? folio_flags.constprop.0+0x150/0x150 [ 731.959389][T14769] ? apparmor_file_permission+0x21f/0x4f0 [ 731.965152][T14769] ? vfs_splice_read+0x3b0/0x3b0 [ 731.970147][T14769] ? bpf_lsm_file_permission+0x9/0x10 [ 731.975570][T14769] ? security_file_permission+0x94/0x100 [ 731.981266][T14769] do_splice_direct+0x1af/0x280 [ 731.986194][T14769] ? splice_direct_to_actor+0xa30/0xa30 [ 731.991798][T14769] ? propagate_umount+0x1af0/0x1af0 [ 731.997054][T14769] ? bpf_lsm_file_permission+0x9/0x10 [ 732.002499][T14769] ? security_file_permission+0x94/0x100 [ 732.008196][T14769] do_sendfile+0xb88/0x1390 [ 732.012767][T14769] ? bit_wait_timeout+0x160/0x160 [ 732.017832][T14769] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 732.023152][T14769] __x64_sys_sendfile64+0x1d6/0x220 [ 732.028396][T14769] ? ksys_write+0x1a7/0x250 [ 732.032908][T14769] ? __ia32_sys_sendfile+0x220/0x220 [ 732.038208][T14769] ? syscall_enter_from_user_mode+0x26/0x80 [ 732.044149][T14769] do_syscall_64+0x38/0xb0 [ 732.048563][T14769] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 732.054466][T14769] RIP: 0033:0x7fa32867cae9 [ 732.058906][T14769] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 732.078625][T14769] RSP: 002b:00007fa32938a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 732.087035][T14769] RAX: ffffffffffffffda RBX: 00007fa32879c050 RCX: 00007fa32867cae9 [ 732.094999][T14769] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 732.102963][T14769] RBP: 00007fa32938a120 R08: 0000000000000000 R09: 0000000000000000 [ 732.110926][T14769] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 732.118894][T14769] R13: 000000000000006e R14: 00007fa32879c050 R15: 00007fa3288bfa48 [ 732.126869][T14769] [ 732.139913][T14770] CPU: 1 PID: 14770 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 732.150355][T14770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 732.160418][T14770] Call Trace: [ 732.163695][T14770] [ 732.166621][T14770] dump_stack_lvl+0x125/0x1b0 [ 732.171480][T14770] should_fail_ex+0x496/0x5b0 [ 732.176189][T14770] should_failslab+0x9/0x20 [ 732.180696][T14770] __kmem_cache_alloc_node+0x2fd/0x350 [ 732.186162][T14770] ? tls_get_rec+0xfa/0x650 [ 732.190674][T14770] ? tls_get_rec+0xfa/0x650 [ 732.195182][T14770] __kmalloc+0x4c/0x100 [ 732.199343][T14770] tls_get_rec+0xfa/0x650 [ 732.203692][T14770] ? __local_bh_enable_ip+0xa4/0x120 [ 732.209119][T14770] tls_sw_sendmsg+0xee1/0x2ba0 [ 732.213933][T14770] ? __lock_acquire+0x182f/0x5de0 [ 732.218978][T14770] ? preempt_count_sub+0x150/0x150 [ 732.224107][T14770] ? tx_work_handler+0x230/0x230 [ 732.229052][T14770] ? aa_sk_perm+0x2c1/0xae0 [ 732.233564][T14770] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 732.239552][T14770] ? aa_af_perm+0x260/0x260 [ 732.244058][T14770] ? __mark_inode_dirty+0x68e/0xd50 [ 732.249258][T14770] ? reacquire_held_locks+0x20b/0x4b0 [ 732.254630][T14770] ? __mark_inode_dirty+0x68e/0xd50 [ 732.259831][T14770] inet6_sendmsg+0x9d/0xe0 [ 732.264249][T14770] ? inet6_compat_ioctl+0x350/0x350 [ 732.269452][T14770] sock_sendmsg+0xd9/0x180 [ 732.273868][T14770] splice_to_socket+0xade/0x1010 [ 732.278903][T14770] ? splice_from_pipe+0x130/0x130 [ 732.283934][T14770] ? atime_needs_update+0x720/0x720 [ 732.289148][T14770] ? shmem_file_read_iter+0xac0/0xac0 [ 732.294525][T14770] ? security_file_permission+0xdc/0x100 [ 732.300172][T14770] ? splice_from_pipe+0x130/0x130 [ 732.305206][T14770] direct_splice_actor+0x118/0x180 [ 732.310326][T14770] splice_direct_to_actor+0x347/0xa30 [ 732.315700][T14770] ? folio_flags.constprop.0+0x150/0x150 [ 732.321340][T14770] ? vfs_splice_read+0x3b0/0x3b0 [ 732.326279][T14770] ? bpf_lsm_file_permission+0x9/0x10 [ 732.331647][T14770] ? security_file_permission+0x94/0x100 [ 732.337289][T14770] do_splice_direct+0x1af/0x280 [ 732.342141][T14770] ? splice_direct_to_actor+0xa30/0xa30 [ 732.347716][T14770] ? propagate_umount+0x1af0/0x1af0 [ 732.352918][T14770] ? bpf_lsm_file_permission+0x9/0x10 [ 732.358287][T14770] ? security_file_permission+0x94/0x100 [ 732.363946][T14770] do_sendfile+0xb88/0x1390 [ 732.368472][T14770] ? bit_wait_timeout+0x160/0x160 [ 732.373505][T14770] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 732.378800][T14770] __x64_sys_sendfile64+0x1d6/0x220 [ 732.384005][T14770] ? ksys_write+0x1a7/0x250 [ 732.388530][T14770] ? __ia32_sys_sendfile+0x220/0x220 [ 732.393832][T14770] ? syscall_enter_from_user_mode+0x26/0x80 [ 732.399832][T14770] do_syscall_64+0x38/0xb0 [ 732.404250][T14770] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 732.410143][T14770] RIP: 0033:0x7f7d8967cae9 [ 732.414550][T14770] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 732.434241][T14770] RSP: 002b:00007f7d8a3b20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 732.442646][T14770] RAX: ffffffffffffffda RBX: 00007f7d8979bf80 RCX: 00007f7d8967cae9 [ 732.450612][T14770] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000006 [ 732.458591][T14770] RBP: 00007f7d8a3b2120 R08: 0000000000000000 R09: 0000000000000000 [ 732.466558][T14770] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 732.474534][T14770] R13: 000000000000000b R14: 00007f7d8979bf80 R15: 00007f7d898bfa48 [ 732.482687][T14770] [ 732.556513][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 732.570961][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 732.653421][T14782] FAULT_INJECTION: forcing a failure. [ 732.653421][T14782] name failslab, interval 1, probability 0, space 0, times 0 [ 732.666608][T14782] CPU: 0 PID: 14782 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 732.677057][T14782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 732.687195][T14782] Call Trace: [ 732.690465][T14782] [ 732.693400][T14782] dump_stack_lvl+0x125/0x1b0 [ 732.698080][T14782] should_fail_ex+0x496/0x5b0 [ 732.702764][T14782] should_failslab+0x9/0x20 [ 732.707278][T14782] __kmem_cache_alloc_node+0x2fd/0x350 [ 732.712740][T14782] ? tls_get_rec+0xfa/0x650 [ 732.717266][T14782] ? tls_get_rec+0xfa/0x650 [ 732.721869][T14782] __kmalloc+0x4c/0x100 [ 732.726057][T14782] tls_get_rec+0xfa/0x650 [ 732.730390][T14782] ? __local_bh_enable_ip+0xa4/0x120 [ 732.735931][T14782] tls_sw_sendmsg+0xee1/0x2ba0 [ 732.740703][T14782] ? __lock_acquire+0x182f/0x5de0 [ 732.745749][T14782] ? preempt_count_sub+0x150/0x150 [ 732.750871][T14782] ? tx_work_handler+0x230/0x230 [ 732.755819][T14782] ? aa_sk_perm+0x2c1/0xae0 [ 732.760331][T14782] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 732.766410][T14782] ? aa_af_perm+0x260/0x260 [ 732.770921][T14782] ? __mark_inode_dirty+0x68e/0xd50 [ 732.776121][T14782] ? reacquire_held_locks+0x20b/0x4b0 [ 732.781493][T14782] ? __mark_inode_dirty+0x68e/0xd50 [ 732.786716][T14782] inet6_sendmsg+0x9d/0xe0 [ 732.791150][T14782] ? inet6_compat_ioctl+0x350/0x350 [ 732.796381][T14782] sock_sendmsg+0xd9/0x180 [ 732.800823][T14782] splice_to_socket+0xade/0x1010 [ 732.805804][T14782] ? splice_from_pipe+0x130/0x130 [ 732.810879][T14782] ? atime_needs_update+0x720/0x720 [ 732.816098][T14782] ? shmem_file_read_iter+0xac0/0xac0 [ 732.821473][T14782] ? security_file_permission+0xdc/0x100 [ 732.827294][T14782] ? splice_from_pipe+0x130/0x130 [ 732.832338][T14782] direct_splice_actor+0x118/0x180 [ 732.837464][T14782] splice_direct_to_actor+0x347/0xa30 [ 732.842844][T14782] ? folio_flags.constprop.0+0x150/0x150 [ 732.848491][T14782] ? vfs_splice_read+0x3b0/0x3b0 [ 732.853884][T14782] ? bpf_lsm_file_permission+0x9/0x10 [ 732.859253][T14782] ? security_file_permission+0x94/0x100 [ 732.864903][T14782] do_splice_direct+0x1af/0x280 [ 732.869757][T14782] ? splice_direct_to_actor+0xa30/0xa30 [ 732.875312][T14782] ? propagate_umount+0x1af0/0x1af0 [ 732.880513][T14782] ? bpf_lsm_file_permission+0x9/0x10 [ 732.885878][T14782] ? security_file_permission+0x94/0x100 [ 732.891520][T14782] do_sendfile+0xb88/0x1390 [ 732.896030][T14782] ? bit_wait_timeout+0x160/0x160 [ 732.901054][T14782] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 732.906348][T14782] __x64_sys_sendfile64+0x1d6/0x220 [ 732.911549][T14782] ? ksys_write+0x1a7/0x250 [ 732.916053][T14782] ? __ia32_sys_sendfile+0x220/0x220 [ 732.921444][T14782] ? syscall_enter_from_user_mode+0x26/0x80 [ 732.927340][T14782] do_syscall_64+0x38/0xb0 [ 732.931751][T14782] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 732.937639][T14782] RIP: 0033:0x7f376ce7cae9 [ 732.942045][T14782] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 732.961646][T14782] RSP: 002b:00007f376dc9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 732.970054][T14782] RAX: ffffffffffffffda RBX: 00007f376cf9c050 RCX: 00007f376ce7cae9 [ 732.978019][T14782] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 732.985983][T14782] RBP: 00007f376dc9c120 R08: 0000000000000000 R09: 0000000000000000 [ 732.994036][T14782] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 733.002002][T14782] R13: 000000000000006e R14: 00007f376cf9c050 R15: 00007f376d0bfa48 [ 733.010068][T14782] [ 733.076659][T14781] FAULT_INJECTION: forcing a failure. [ 733.076659][T14781] name failslab, interval 1, probability 0, space 0, times 0 [ 733.153564][T14781] CPU: 1 PID: 14781 Comm: syz-executor.5 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 733.164051][T14781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 733.174220][T14781] Call Trace: [ 733.177507][T14781] [ 733.180436][T14781] dump_stack_lvl+0x125/0x1b0 [ 733.185124][T14781] should_fail_ex+0x496/0x5b0 [ 733.189836][T14781] should_failslab+0x9/0x20 [ 733.194351][T14781] __kmem_cache_alloc_node+0x2fd/0x350 [ 733.199829][T14781] ? tls_get_rec+0xfa/0x650 [ 733.204390][T14781] ? tls_get_rec+0xfa/0x650 [ 733.209017][T14781] __kmalloc+0x4c/0x100 [ 733.213183][T14781] tls_get_rec+0xfa/0x650 [ 733.217521][T14781] ? __local_bh_enable_ip+0xa4/0x120 [ 733.222820][T14781] tls_sw_sendmsg+0xee1/0x2ba0 [ 733.227622][T14781] ? __lock_acquire+0x182f/0x5de0 [ 733.232678][T14781] ? preempt_count_sub+0x150/0x150 [ 733.237835][T14781] ? tx_work_handler+0x230/0x230 [ 733.242790][T14781] ? aa_sk_perm+0x2c1/0xae0 [ 733.247300][T14781] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 733.253297][T14781] ? aa_af_perm+0x260/0x260 [ 733.257808][T14781] ? __mark_inode_dirty+0x68e/0xd50 [ 733.263049][T14781] ? reacquire_held_locks+0x20b/0x4b0 [ 733.268433][T14781] ? __mark_inode_dirty+0x68e/0xd50 [ 733.273640][T14781] inet6_sendmsg+0x9d/0xe0 [ 733.278086][T14781] ? inet6_compat_ioctl+0x350/0x350 [ 733.283331][T14781] sock_sendmsg+0xd9/0x180 [ 733.287763][T14781] splice_to_socket+0xade/0x1010 [ 733.292733][T14781] ? splice_from_pipe+0x130/0x130 [ 733.297807][T14781] ? atime_needs_update+0x720/0x720 [ 733.303063][T14781] ? shmem_file_read_iter+0xac0/0xac0 [ 733.308459][T14781] ? security_file_permission+0xdc/0x100 [ 733.314128][T14781] ? splice_from_pipe+0x130/0x130 [ 733.319229][T14781] direct_splice_actor+0x118/0x180 [ 733.324376][T14781] splice_direct_to_actor+0x347/0xa30 [ 733.329779][T14781] ? folio_flags.constprop.0+0x150/0x150 [ 733.335444][T14781] ? vfs_splice_read+0x3b0/0x3b0 [ 733.340389][T14781] ? bpf_lsm_file_permission+0x9/0x10 [ 733.345764][T14781] ? security_file_permission+0x94/0x100 [ 733.351412][T14781] do_splice_direct+0x1af/0x280 [ 733.356275][T14781] ? splice_direct_to_actor+0xa30/0xa30 [ 733.361832][T14781] ? propagate_umount+0x1af0/0x1af0 [ 733.367036][T14781] ? bpf_lsm_file_permission+0x9/0x10 [ 733.372410][T14781] ? security_file_permission+0x94/0x100 [ 733.378056][T14781] do_sendfile+0xb88/0x1390 [ 733.382583][T14781] ? bit_wait_timeout+0x160/0x160 [ 733.387615][T14781] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 733.392922][T14781] __x64_sys_sendfile64+0x1d6/0x220 [ 733.398422][T14781] ? ksys_write+0x1a7/0x250 [ 733.402986][T14781] ? __ia32_sys_sendfile+0x220/0x220 [ 733.408296][T14781] ? syscall_enter_from_user_mode+0x26/0x80 [ 733.414202][T14781] do_syscall_64+0x38/0xb0 [ 733.418626][T14781] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 733.424551][T14781] RIP: 0033:0x7f64d1c7cae9 [ 733.428969][T14781] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 22:15:38 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 4) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 733.448594][T14781] RSP: 002b:00007f64d07fe0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 733.457032][T14781] RAX: ffffffffffffffda RBX: 00007f64d1d9c050 RCX: 00007f64d1c7cae9 [ 733.465004][T14781] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 733.473000][T14781] RBP: 00007f64d07fe120 R08: 0000000000000000 R09: 0000000000000000 [ 733.480985][T14781] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 733.488950][T14781] R13: 000000000000006e R14: 00007f64d1d9c050 R15: 00007f64d1ebfa48 [ 733.496927][T14781] 22:15:38 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 3) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 733.584885][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:38 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) (fail_nth: 4) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 733.752394][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 733.849042][T14792] FAULT_INJECTION: forcing a failure. [ 733.849042][T14792] name failslab, interval 1, probability 0, space 0, times 0 [ 733.966659][T14792] CPU: 1 PID: 14792 Comm: syz-executor.2 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 733.977186][T14792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 733.987243][T14792] Call Trace: [ 733.990522][T14792] [ 733.993450][T14792] dump_stack_lvl+0x125/0x1b0 [ 733.998143][T14792] should_fail_ex+0x496/0x5b0 [ 734.002832][T14792] should_failslab+0x9/0x20 [ 734.007346][T14792] __kmem_cache_alloc_node+0x2fd/0x350 [ 734.012815][T14792] ? tls_get_rec+0xfa/0x650 [ 734.017325][T14792] ? tls_get_rec+0xfa/0x650 [ 734.021833][T14792] __kmalloc+0x4c/0x100 [ 734.026002][T14792] tls_get_rec+0xfa/0x650 [ 734.030339][T14792] ? __local_bh_enable_ip+0xa4/0x120 [ 734.035661][T14792] tls_sw_sendmsg+0xee1/0x2ba0 [ 734.040477][T14792] ? __lock_acquire+0x182f/0x5de0 [ 734.045525][T14792] ? preempt_count_sub+0x150/0x150 [ 734.050674][T14792] ? tx_work_handler+0x230/0x230 [ 734.055637][T14792] ? aa_sk_perm+0x2c1/0xae0 [ 734.060157][T14792] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 734.066191][T14792] ? aa_af_perm+0x260/0x260 [ 734.070711][T14792] ? __mark_inode_dirty+0x68e/0xd50 [ 734.075924][T14792] ? reacquire_held_locks+0x20b/0x4b0 [ 734.081306][T14792] ? __mark_inode_dirty+0x68e/0xd50 [ 734.086516][T14792] inet6_sendmsg+0x9d/0xe0 [ 734.090941][T14792] ? inet6_compat_ioctl+0x350/0x350 [ 734.096161][T14792] sock_sendmsg+0xd9/0x180 [ 734.100595][T14792] splice_to_socket+0xade/0x1010 [ 734.105564][T14792] ? splice_from_pipe+0x130/0x130 [ 734.110619][T14792] ? atime_needs_update+0x720/0x720 [ 734.115863][T14792] ? shmem_file_read_iter+0xac0/0xac0 [ 734.121237][T14792] ? security_file_permission+0xdc/0x100 [ 734.126877][T14792] ? splice_from_pipe+0x130/0x130 [ 734.131907][T14792] direct_splice_actor+0x118/0x180 [ 734.137046][T14792] splice_direct_to_actor+0x347/0xa30 [ 734.142426][T14792] ? folio_flags.constprop.0+0x150/0x150 [ 734.148073][T14792] ? vfs_splice_read+0x3b0/0x3b0 [ 734.153014][T14792] ? bpf_lsm_file_permission+0x9/0x10 [ 734.158384][T14792] ? security_file_permission+0x94/0x100 [ 734.164026][T14792] do_splice_direct+0x1af/0x280 [ 734.168884][T14792] ? splice_direct_to_actor+0xa30/0xa30 [ 734.174436][T14792] ? propagate_umount+0x1af0/0x1af0 [ 734.179641][T14792] ? bpf_lsm_file_permission+0x9/0x10 [ 734.185006][T14792] ? security_file_permission+0x94/0x100 [ 734.190661][T14792] do_sendfile+0xb88/0x1390 [ 734.195191][T14792] ? bit_wait_timeout+0x160/0x160 [ 734.200305][T14792] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 734.205600][T14792] __x64_sys_sendfile64+0x1d6/0x220 [ 734.210808][T14792] ? ksys_write+0x1a7/0x250 [ 734.215314][T14792] ? __ia32_sys_sendfile+0x220/0x220 [ 734.220601][T14792] ? syscall_enter_from_user_mode+0x26/0x80 [ 734.226500][T14792] do_syscall_64+0x38/0xb0 [ 734.230915][T14792] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 734.236818][T14792] RIP: 0033:0x7f2752e7cae9 [ 734.241225][T14792] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 734.260835][T14792] RSP: 002b:00007f2753c010c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 734.269244][T14792] RAX: ffffffffffffffda RBX: 00007f2752f9c120 RCX: 00007f2752e7cae9 [ 734.277211][T14792] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 734.285175][T14792] RBP: 00007f2753c01120 R08: 0000000000000000 R09: 0000000000000000 [ 734.293142][T14792] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 734.301110][T14792] R13: 000000000000006e R14: 00007f2752f9c120 R15: 00007f27530bfa48 [ 734.309092][T14792] [ 734.376646][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:39 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 3) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 734.806807][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:39 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 5) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:40 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 4) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:40 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 734.987348][T14800] FAULT_INJECTION: forcing a failure. [ 734.987348][T14800] name failslab, interval 1, probability 0, space 0, times 0 [ 735.001508][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 735.035170][T14803] FAULT_INJECTION: forcing a failure. [ 735.035170][T14803] name failslab, interval 1, probability 0, space 0, times 0 [ 735.108453][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 735.124072][T14803] CPU: 0 PID: 14803 Comm: syz-executor.1 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 735.134589][T14803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 735.144647][T14803] Call Trace: [ 735.147918][T14803] [ 735.150844][T14803] dump_stack_lvl+0x125/0x1b0 [ 735.155528][T14803] should_fail_ex+0x496/0x5b0 [ 735.160210][T14803] should_failslab+0x9/0x20 [ 735.164760][T14803] __kmem_cache_alloc_node+0x6b/0x350 [ 735.170133][T14803] ? skcipher_walk_next+0xf2d/0x1610 [ 735.175419][T14803] ? __crypto_xor+0x452/0x5f0 [ 735.180102][T14803] ? skcipher_walk_next+0xf2d/0x1610 [ 735.185388][T14803] __kmalloc+0x4c/0x100 [ 735.189544][T14803] skcipher_walk_next+0xf2d/0x1610 [ 735.194661][T14803] skcipher_walk_done+0x451/0xd60 [ 735.199689][T14803] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 735.205076][T14803] ctr_crypt+0x12e/0x280 [ 735.209323][T14803] ? xts_encrypt+0x20/0x20 [ 735.213746][T14803] ? shash_async_digest+0xb0/0xb0 [ 735.218781][T14803] ? crypto_rfc4309_encrypt+0x80/0x80 [ 735.224180][T14803] crypto_skcipher_encrypt+0xbc/0x100 [ 735.229557][T14803] crypto_skcipher_encrypt+0xbc/0x100 [ 735.234928][T14803] crypto_ccm_encrypt+0x37d/0x4c0 [ 735.239956][T14803] crypto_aead_encrypt+0xbc/0x100 [ 735.244976][T14803] tls_push_record+0x1bf3/0x31b0 [ 735.249928][T14803] ? tls_tx_records+0x6e0/0x6e0 [ 735.254778][T14803] ? sk_psock_get+0x146/0x470 [ 735.259454][T14803] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 735.264649][T14803] ? find_held_lock+0x2d/0x110 [ 735.269416][T14803] bpf_exec_tx_verdict+0xdba/0x11d0 [ 735.274617][T14803] ? page_ext_get+0x182/0x310 [ 735.279296][T14803] ? tls_push_record+0x31b0/0x31b0 [ 735.284453][T14803] ? __sk_mem_schedule+0xa7/0xe0 [ 735.289444][T14803] ? sk_msg_alloc+0x6e8/0xaa0 [ 735.294155][T14803] tls_sw_sendmsg+0xd3e/0x2ba0 [ 735.298938][T14803] ? tx_work_handler+0x230/0x230 [ 735.303879][T14803] ? aa_sk_perm+0x2c1/0xae0 [ 735.308441][T14803] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 735.314452][T14803] ? __mark_inode_dirty+0x68e/0xd50 [ 735.319650][T14803] ? reacquire_held_locks+0x20b/0x4b0 [ 735.325021][T14803] ? __mark_inode_dirty+0x68e/0xd50 [ 735.330221][T14803] inet6_sendmsg+0x9d/0xe0 [ 735.334638][T14803] ? inet6_compat_ioctl+0x350/0x350 [ 735.339838][T14803] sock_sendmsg+0xd9/0x180 [ 735.344252][T14803] splice_to_socket+0xade/0x1010 [ 735.349203][T14803] ? splice_from_pipe+0x130/0x130 [ 735.354262][T14803] ? atime_needs_update+0x720/0x720 [ 735.359508][T14803] ? shmem_file_read_iter+0xac0/0xac0 [ 735.364877][T14803] ? security_file_permission+0xdc/0x100 [ 735.370515][T14803] ? splice_from_pipe+0x130/0x130 [ 735.375563][T14803] direct_splice_actor+0x118/0x180 [ 735.380680][T14803] splice_direct_to_actor+0x347/0xa30 [ 735.386062][T14803] ? folio_flags.constprop.0+0x150/0x150 [ 735.391701][T14803] ? vfs_splice_read+0x3b0/0x3b0 [ 735.396641][T14803] ? bpf_lsm_file_permission+0x9/0x10 [ 735.402005][T14803] ? security_file_permission+0x94/0x100 [ 735.407663][T14803] do_splice_direct+0x1af/0x280 [ 735.412530][T14803] ? splice_direct_to_actor+0xa30/0xa30 [ 735.418098][T14803] ? propagate_umount+0x1af0/0x1af0 [ 735.423297][T14803] ? bpf_lsm_file_permission+0x9/0x10 [ 735.428666][T14803] ? security_file_permission+0x94/0x100 [ 735.434311][T14803] do_sendfile+0xb88/0x1390 [ 735.438821][T14803] ? bit_wait_timeout+0x160/0x160 [ 735.443846][T14803] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 735.449143][T14803] __x64_sys_sendfile64+0x1d6/0x220 [ 735.454355][T14803] ? ksys_write+0x1a7/0x250 [ 735.458861][T14803] ? __ia32_sys_sendfile+0x220/0x220 [ 735.464152][T14803] ? syscall_enter_from_user_mode+0x26/0x80 [ 735.470052][T14803] do_syscall_64+0x38/0xb0 [ 735.474467][T14803] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 735.480361][T14803] RIP: 0033:0x7f43d487cae9 [ 735.484776][T14803] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 22:15:40 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 4) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 735.504384][T14803] RSP: 002b:00007f43d562d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 735.512792][T14803] RAX: ffffffffffffffda RBX: 00007f43d499bf80 RCX: 00007f43d487cae9 [ 735.520755][T14803] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 735.528727][T14803] RBP: 00007f43d562d120 R08: 0000000000000000 R09: 0000000000000000 [ 735.536692][T14803] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 735.544664][T14803] R13: 000000000000000b R14: 00007f43d499bf80 R15: 00007f43d4abfa48 [ 735.552654][T14803] [ 735.619330][T14800] CPU: 0 PID: 14800 Comm: syz-executor.3 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 735.629809][T14800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 735.639864][T14800] Call Trace: [ 735.643140][T14800] [ 735.646076][T14800] dump_stack_lvl+0x125/0x1b0 [ 735.650770][T14800] should_fail_ex+0x496/0x5b0 [ 735.655454][T14800] should_failslab+0x9/0x20 [ 735.659960][T14800] __kmem_cache_alloc_node+0x2fd/0x350 [ 735.665423][T14800] ? tls_get_rec+0xfa/0x650 [ 735.669936][T14800] ? tls_get_rec+0xfa/0x650 [ 735.674447][T14800] __kmalloc+0x4c/0x100 [ 735.678623][T14800] tls_get_rec+0xfa/0x650 [ 735.682972][T14800] ? __local_bh_enable_ip+0xa4/0x120 [ 735.688260][T14800] tls_sw_sendmsg+0xee1/0x2ba0 [ 735.693033][T14800] ? __lock_acquire+0x182f/0x5de0 [ 735.698083][T14800] ? preempt_count_sub+0x150/0x150 [ 735.703207][T14800] ? tx_work_handler+0x230/0x230 [ 735.708149][T14800] ? aa_sk_perm+0x2c1/0xae0 [ 735.712659][T14800] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 735.718653][T14800] ? aa_af_perm+0x260/0x260 [ 735.723178][T14800] ? __mark_inode_dirty+0x68e/0xd50 [ 735.728427][T14800] ? reacquire_held_locks+0x20b/0x4b0 [ 735.733811][T14800] ? __mark_inode_dirty+0x68e/0xd50 [ 735.739021][T14800] inet6_sendmsg+0x9d/0xe0 [ 735.743446][T14800] ? inet6_compat_ioctl+0x350/0x350 [ 735.748653][T14800] sock_sendmsg+0xd9/0x180 [ 735.753072][T14800] splice_to_socket+0xade/0x1010 [ 735.758029][T14800] ? splice_from_pipe+0x130/0x130 [ 735.763074][T14800] ? atime_needs_update+0x720/0x720 [ 735.768292][T14800] ? shmem_file_read_iter+0xac0/0xac0 [ 735.773677][T14800] ? security_file_permission+0xdc/0x100 [ 735.779356][T14800] ? splice_from_pipe+0x130/0x130 [ 735.784389][T14800] direct_splice_actor+0x118/0x180 [ 735.789505][T14800] splice_direct_to_actor+0x347/0xa30 [ 735.794884][T14800] ? folio_flags.constprop.0+0x150/0x150 [ 735.800527][T14800] ? vfs_splice_read+0x3b0/0x3b0 [ 735.805473][T14800] ? bpf_lsm_file_permission+0x9/0x10 [ 735.810857][T14800] ? security_file_permission+0x94/0x100 [ 735.816513][T14800] do_splice_direct+0x1af/0x280 [ 735.821378][T14800] ? splice_direct_to_actor+0xa30/0xa30 [ 735.826939][T14800] ? propagate_umount+0x1af0/0x1af0 [ 735.832143][T14800] ? bpf_lsm_file_permission+0x9/0x10 [ 735.837517][T14800] ? security_file_permission+0x94/0x100 [ 735.843160][T14800] do_sendfile+0xb88/0x1390 [ 735.847671][T14800] ? rcu_is_watching+0x12/0xb0 [ 735.852440][T14800] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 735.857731][T14800] ? xfd_validate_state+0x5d/0x180 [ 735.862849][T14800] ? restore_fpregs_from_fpstate+0xc1/0x1d0 [ 735.868748][T14800] __x64_sys_sendfile64+0x1d6/0x220 [ 735.873974][T14800] ? ksys_write+0x1a7/0x250 [ 735.878529][T14800] ? __ia32_sys_sendfile+0x220/0x220 [ 735.883870][T14800] ? syscall_enter_from_user_mode+0x26/0x80 [ 735.889770][T14800] do_syscall_64+0x38/0xb0 [ 735.894191][T14800] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 735.900080][T14800] RIP: 0033:0x7fa32867cae9 [ 735.904500][T14800] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 735.924115][T14800] RSP: 002b:00007fa3293690c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 735.932544][T14800] RAX: ffffffffffffffda RBX: 00007fa32879c120 RCX: 00007fa32867cae9 [ 735.940594][T14800] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 735.948569][T14800] RBP: 00007fa329369120 R08: 0000000000000000 R09: 0000000000000000 [ 735.956644][T14800] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 735.964622][T14800] R13: 000000000000006e R14: 00007fa32879c120 R15: 00007fa3288bfa48 [ 735.972730][T14800] [ 736.079606][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 736.221015][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:41 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 6) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 736.617453][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:41 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 4) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 736.882157][T14817] FAULT_INJECTION: forcing a failure. [ 736.882157][T14817] name failslab, interval 1, probability 0, space 0, times 0 [ 736.970178][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 737.016037][T14817] CPU: 1 PID: 14817 Comm: syz-executor.1 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 737.026518][T14817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 737.036578][T14817] Call Trace: [ 737.039851][T14817] [ 737.042791][T14817] dump_stack_lvl+0x125/0x1b0 [ 737.048057][T14817] should_fail_ex+0x496/0x5b0 [ 737.052814][T14817] should_failslab+0x9/0x20 [ 737.057366][T14817] kmem_cache_alloc_node+0x389/0x3f0 [ 737.062673][T14817] ? __alloc_skb+0x287/0x330 [ 737.067322][T14817] __alloc_skb+0x287/0x330 [ 737.071771][T14817] ? __napi_build_skb+0x50/0x50 [ 737.076654][T14817] tcp_stream_alloc_skb+0x34/0x560 [ 737.081799][T14817] tcp_sendmsg_locked+0xf47/0x3420 [ 737.086939][T14817] ? scatterwalk_copychunks+0x22c/0x560 [ 737.092517][T14817] ? tcp_sendmsg_fastopen+0x720/0x720 [ 737.097938][T14817] ? skcipher_walk_done+0x458/0xd60 [ 737.103178][T14817] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 737.108609][T14817] tls_push_sg+0x24a/0x730 [ 737.113058][T14817] ? wait_on_pending_writer+0x4b0/0x4b0 [ 737.118645][T14817] ? crypto_skcipher_encrypt+0xc3/0x100 [ 737.124221][T14817] tls_tx_records+0x343/0x6e0 [ 737.128931][T14817] tls_push_record+0x2059/0x31b0 [ 737.133916][T14817] ? tls_tx_records+0x6e0/0x6e0 [ 737.138789][T14817] ? sk_psock_get+0x146/0x470 [ 737.143490][T14817] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 737.148713][T14817] ? find_held_lock+0x2d/0x110 [ 737.153512][T14817] bpf_exec_tx_verdict+0xdba/0x11d0 [ 737.158750][T14817] ? tls_push_record+0x31b0/0x31b0 [ 737.163972][T14817] ? print_usage_bug.part.0+0x670/0x670 [ 737.169610][T14817] ? __sk_mem_schedule+0xa7/0xe0 [ 737.174580][T14817] ? sk_msg_alloc+0x6e8/0xaa0 [ 737.179295][T14817] tls_sw_sendmsg+0xd3e/0x2ba0 [ 737.184113][T14817] ? tx_work_handler+0x230/0x230 [ 737.189081][T14817] ? aa_sk_perm+0x2c1/0xae0 [ 737.193620][T14817] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 737.199632][T14817] ? __mark_inode_dirty+0x68e/0xd50 [ 737.204857][T14817] ? reacquire_held_locks+0x20b/0x4b0 [ 737.210257][T14817] ? __mark_inode_dirty+0x68e/0xd50 [ 737.215487][T14817] inet6_sendmsg+0x9d/0xe0 [ 737.219930][T14817] ? inet6_compat_ioctl+0x350/0x350 [ 737.225160][T14817] sock_sendmsg+0xd9/0x180 [ 737.229602][T14817] splice_to_socket+0xade/0x1010 [ 737.234589][T14817] ? splice_from_pipe+0x130/0x130 [ 737.239654][T14817] ? atime_needs_update+0x720/0x720 [ 737.244904][T14817] ? shmem_file_read_iter+0xac0/0xac0 [ 737.250304][T14817] ? security_file_permission+0xdc/0x100 [ 737.255991][T14817] ? splice_from_pipe+0x130/0x130 [ 737.261134][T14817] direct_splice_actor+0x118/0x180 [ 737.266282][T14817] splice_direct_to_actor+0x347/0xa30 [ 737.271781][T14817] ? folio_flags.constprop.0+0x150/0x150 [ 737.277454][T14817] ? vfs_splice_read+0x3b0/0x3b0 [ 737.282419][T14817] ? bpf_lsm_file_permission+0x9/0x10 [ 737.287810][T14817] ? security_file_permission+0x94/0x100 [ 737.293484][T14817] do_splice_direct+0x1af/0x280 [ 737.298489][T14817] ? splice_direct_to_actor+0xa30/0xa30 [ 737.304082][T14817] ? propagate_umount+0x1af0/0x1af0 [ 737.309317][T14817] ? bpf_lsm_file_permission+0x9/0x10 [ 737.314711][T14817] ? security_file_permission+0x94/0x100 [ 737.320384][T14817] do_sendfile+0xb88/0x1390 [ 737.324946][T14817] ? bit_wait_timeout+0x160/0x160 [ 737.329999][T14817] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 737.335328][T14817] __x64_sys_sendfile64+0x1d6/0x220 [ 737.340581][T14817] ? ksys_write+0x1a7/0x250 [ 737.345140][T14817] ? __ia32_sys_sendfile+0x220/0x220 [ 737.350570][T14817] ? syscall_enter_from_user_mode+0x26/0x80 [ 737.356617][T14817] do_syscall_64+0x38/0xb0 [ 737.361084][T14817] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 737.367001][T14817] RIP: 0033:0x7f43d487cae9 [ 737.371444][T14817] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 737.391512][T14817] RSP: 002b:00007f43d562d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 737.400296][T14817] RAX: ffffffffffffffda RBX: 00007f43d499bf80 RCX: 00007f43d487cae9 [ 737.408379][T14817] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 737.416387][T14817] RBP: 00007f43d562d120 R08: 0000000000000000 R09: 0000000000000000 [ 737.424454][T14817] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 737.432443][T14817] R13: 000000000000000b R14: 00007f43d499bf80 R15: 00007f43d4abfa48 [ 737.440445][T14817] 22:15:42 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r2 = dup(r1) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x9) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) sendfile(r3, r0, &(0x7f0000000100)=0x1, 0xfffffffffffffffa) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) dup(r2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r6, r4, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:42 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r2 = dup(r1) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x9) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) sendfile(r3, r0, &(0x7f0000000100)=0x1, 0xfffffffffffffffa) (async) sendfile(r3, r0, &(0x7f0000000100)=0x1, 0xfffffffffffffffa) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) dup(r2) (async) dup(r2) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r6, r4, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:42 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 4) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:42 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r2 = dup(r1) (async) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x9) (async) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './bus\x00'}) sendfile(r3, r0, &(0x7f0000000100)=0x1, 0xfffffffffffffffa) r4 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) dup(r2) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r7, 0x208200) (async) sendfile(r6, r4, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:43 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) ftruncate(r2, 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 738.238857][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 738.306292][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 738.340520][T14836] FAULT_INJECTION: forcing a failure. [ 738.340520][T14836] name failslab, interval 1, probability 0, space 0, times 0 [ 738.422665][T14836] CPU: 1 PID: 14836 Comm: syz-executor.3 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 738.433159][T14836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 738.443239][T14836] Call Trace: [ 738.446517][T14836] [ 738.449445][T14836] dump_stack_lvl+0x125/0x1b0 [ 738.454141][T14836] should_fail_ex+0x496/0x5b0 [ 738.458840][T14836] should_failslab+0x9/0x20 [ 738.463347][T14836] __kmem_cache_alloc_node+0x2fd/0x350 [ 738.468805][T14836] ? memcg_alloc_slab_cgroups+0xa9/0x170 [ 738.474452][T14836] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 738.480611][T14836] ? memcg_alloc_slab_cgroups+0xa9/0x170 [ 738.486251][T14836] __kmalloc_node+0x4f/0x100 [ 738.490848][T14836] memcg_alloc_slab_cgroups+0xa9/0x170 [ 738.496326][T14836] ? alloc_pages+0x1b1/0x270 [ 738.500929][T14836] allocate_slab+0x2c7/0x380 [ 738.505559][T14836] ___slab_alloc+0x8bc/0x1570 [ 738.510275][T14836] ? find_held_lock+0x2d/0x110 [ 738.515157][T14836] ? alloc_pipe_info+0x1ed/0x580 [ 738.520148][T14836] ? alloc_pipe_info+0x1ed/0x580 [ 738.525120][T14836] ? __slab_alloc.constprop.0+0x56/0xa0 [ 738.530781][T14836] __slab_alloc.constprop.0+0x56/0xa0 [ 738.536180][T14836] __kmem_cache_alloc_node+0x137/0x350 [ 738.541660][T14836] ? alloc_pipe_info+0x1ed/0x580 [ 738.546635][T14836] ? alloc_pipe_info+0x1ed/0x580 [ 738.551629][T14836] __kmalloc+0x4c/0x100 [ 738.555903][T14836] alloc_pipe_info+0x1ed/0x580 [ 738.560698][T14836] splice_direct_to_actor+0x78b/0xa30 [ 738.566112][T14836] ? folio_flags.constprop.0+0x150/0x150 [ 738.571783][T14836] ? apparmor_file_permission+0x21f/0x4f0 [ 738.577527][T14836] ? vfs_splice_read+0x3b0/0x3b0 [ 738.582493][T14836] ? bpf_lsm_file_permission+0x9/0x10 [ 738.587885][T14836] ? security_file_permission+0x94/0x100 [ 738.593557][T14836] do_splice_direct+0x1af/0x280 [ 738.598450][T14836] ? splice_direct_to_actor+0xa30/0xa30 [ 738.604032][T14836] ? propagate_umount+0x1af0/0x1af0 [ 738.609267][T14836] ? bpf_lsm_file_permission+0x9/0x10 [ 738.614661][T14836] ? security_file_permission+0x94/0x100 [ 738.620345][T14836] do_sendfile+0xb88/0x1390 [ 738.624905][T14836] ? bit_wait_timeout+0x160/0x160 [ 738.629969][T14836] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 738.635315][T14836] __x64_sys_sendfile64+0x1d6/0x220 [ 738.640554][T14836] ? ksys_write+0x1a7/0x250 [ 738.645091][T14836] ? __ia32_sys_sendfile+0x220/0x220 [ 738.650418][T14836] ? syscall_enter_from_user_mode+0x26/0x80 [ 738.656352][T14836] do_syscall_64+0x38/0xb0 [ 738.660878][T14836] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 738.666813][T14836] RIP: 0033:0x7fa32867cae9 [ 738.671263][T14836] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 738.690906][T14836] RSP: 002b:00007fa32938a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 738.699347][T14836] RAX: ffffffffffffffda RBX: 00007fa32879c050 RCX: 00007fa32867cae9 [ 738.707331][T14836] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 738.715317][T14836] RBP: 00007fa32938a120 R08: 0000000000000000 R09: 0000000000000000 [ 738.723300][T14836] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 738.731374][T14836] R13: 000000000000006e R14: 00007fa32879c050 R15: 00007fa3288bfa48 [ 738.739376][T14836] 22:15:44 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 5) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 739.434793][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 739.537157][T14846] FAULT_INJECTION: forcing a failure. [ 739.537157][T14846] name failslab, interval 1, probability 0, space 0, times 0 22:15:44 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 739.747207][T14846] CPU: 1 PID: 14846 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 739.757786][T14846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 739.767848][T14846] Call Trace: [ 739.771129][T14846] [ 739.774168][T14846] dump_stack_lvl+0x125/0x1b0 [ 739.778897][T14846] should_fail_ex+0x496/0x5b0 [ 739.783609][T14846] should_failslab+0x9/0x20 [ 739.788225][T14846] __kmem_cache_alloc_node+0x2fd/0x350 [ 739.793757][T14846] ? tls_get_rec+0xfa/0x650 [ 739.798346][T14846] ? tls_get_rec+0xfa/0x650 [ 739.802904][T14846] __kmalloc+0x4c/0x100 [ 739.807098][T14846] tls_get_rec+0xfa/0x650 [ 739.811496][T14846] ? __local_bh_enable_ip+0xa4/0x120 [ 739.816820][T14846] tls_sw_sendmsg+0xee1/0x2ba0 [ 739.821623][T14846] ? lockdep_hardirqs_on+0x7d/0x100 [ 739.826860][T14846] ? asm_sysvec_reschedule_ipi+0x1a/0x20 [ 739.832605][T14846] ? tx_work_handler+0x230/0x230 [ 739.837593][T14846] ? aa_sk_perm+0x2ad/0xae0 [ 739.842150][T14846] ? aa_sk_perm+0x2b7/0xae0 [ 739.846672][T14846] ? aa_sk_perm+0x2c1/0xae0 [ 739.851187][T14846] ? aa_af_perm+0x260/0x260 [ 739.855693][T14846] ? lockdep_hardirqs_on+0x7d/0x100 [ 739.860904][T14846] ? asm_sysvec_reschedule_ipi+0x1a/0x20 [ 739.866546][T14846] inet6_sendmsg+0x9d/0xe0 [ 739.870972][T14846] ? inet6_compat_ioctl+0x350/0x350 [ 739.876261][T14846] sock_sendmsg+0xd9/0x180 [ 739.880675][T14846] splice_to_socket+0xade/0x1010 [ 739.885630][T14846] ? splice_from_pipe+0x130/0x130 [ 739.890665][T14846] ? atime_needs_update+0x720/0x720 [ 739.895898][T14846] ? shmem_file_read_iter+0xac0/0xac0 [ 739.901274][T14846] ? security_file_permission+0xdc/0x100 [ 739.906919][T14846] ? splice_from_pipe+0x130/0x130 [ 739.911951][T14846] direct_splice_actor+0x118/0x180 [ 739.917070][T14846] splice_direct_to_actor+0x347/0xa30 [ 739.922471][T14846] ? folio_flags.constprop.0+0x150/0x150 [ 739.928107][T14846] ? vfs_splice_read+0x3b0/0x3b0 [ 739.933052][T14846] ? bpf_lsm_file_permission+0x9/0x10 [ 739.938419][T14846] ? security_file_permission+0x94/0x100 [ 739.944062][T14846] do_splice_direct+0x1af/0x280 [ 739.948917][T14846] ? splice_direct_to_actor+0xa30/0xa30 [ 739.954469][T14846] ? propagate_umount+0x1af0/0x1af0 [ 739.959676][T14846] ? bpf_lsm_file_permission+0x9/0x10 [ 739.965041][T14846] ? security_file_permission+0x94/0x100 [ 739.970680][T14846] do_sendfile+0xb88/0x1390 [ 739.975195][T14846] ? bit_wait_timeout+0x160/0x160 [ 739.980239][T14846] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 739.985579][T14846] __x64_sys_sendfile64+0x1d6/0x220 [ 739.990796][T14846] ? ksys_write+0x1a7/0x250 [ 739.995402][T14846] ? __ia32_sys_sendfile+0x220/0x220 [ 740.000703][T14846] ? syscall_enter_from_user_mode+0x26/0x80 [ 740.006612][T14846] do_syscall_64+0x38/0xb0 [ 740.011025][T14846] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 740.016916][T14846] RIP: 0033:0x7f376ce7cae9 [ 740.021368][T14846] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 740.041166][T14846] RSP: 002b:00007f376dc9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 740.049858][T14846] RAX: ffffffffffffffda RBX: 00007f376cf9c050 RCX: 00007f376ce7cae9 [ 740.057962][T14846] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 740.066123][T14846] RBP: 00007f376dc9c120 R08: 0000000000000000 R09: 0000000000000000 [ 740.074102][T14846] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 740.082071][T14846] R13: 000000000000006e R14: 00007f376cf9c050 R15: 00007f376d0bfa48 [ 740.090054][T14846] 22:15:45 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 5) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 740.121411][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:45 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async, rerun: 32) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async, rerun: 32) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) (async, rerun: 64) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (rerun: 64) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) ftruncate(r2, 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) (async) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:45 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 5) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 740.374219][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 740.394876][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 740.409307][T14855] FAULT_INJECTION: forcing a failure. [ 740.409307][T14855] name failslab, interval 1, probability 0, space 0, times 0 [ 740.422401][T14855] CPU: 1 PID: 14855 Comm: syz-executor.5 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 740.432850][T14855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 740.442914][T14855] Call Trace: [ 740.446195][T14855] [ 740.449126][T14855] dump_stack_lvl+0x125/0x1b0 [ 740.453825][T14855] should_fail_ex+0x496/0x5b0 [ 740.458532][T14855] should_failslab+0x9/0x20 [ 740.463139][T14855] __kmem_cache_alloc_node+0x2fd/0x350 [ 740.468605][T14855] ? tls_get_rec+0xfa/0x650 [ 740.473142][T14855] ? tls_get_rec+0xfa/0x650 [ 740.477703][T14855] __kmalloc+0x4c/0x100 [ 740.481871][T14855] tls_get_rec+0xfa/0x650 [ 740.486237][T14855] ? __local_bh_enable_ip+0xa4/0x120 [ 740.491535][T14855] tls_sw_sendmsg+0xee1/0x2ba0 [ 740.496315][T14855] ? __lock_acquire+0x182f/0x5de0 [ 740.501357][T14855] ? preempt_count_sub+0x150/0x150 [ 740.506482][T14855] ? tx_work_handler+0x230/0x230 [ 740.511457][T14855] ? aa_sk_perm+0x2c1/0xae0 [ 740.515969][T14855] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 740.521958][T14855] ? aa_af_perm+0x260/0x260 [ 740.526494][T14855] ? __mark_inode_dirty+0x68e/0xd50 [ 740.531750][T14855] ? reacquire_held_locks+0x20b/0x4b0 [ 740.537170][T14855] ? __mark_inode_dirty+0x68e/0xd50 [ 740.542381][T14855] inet6_sendmsg+0x9d/0xe0 [ 740.546808][T14855] ? inet6_compat_ioctl+0x350/0x350 [ 740.552012][T14855] sock_sendmsg+0xd9/0x180 [ 740.556430][T14855] splice_to_socket+0xade/0x1010 [ 740.561383][T14855] ? splice_from_pipe+0x130/0x130 [ 740.566419][T14855] ? atime_needs_update+0x720/0x720 [ 740.571637][T14855] ? shmem_file_read_iter+0xac0/0xac0 [ 740.577017][T14855] ? security_file_permission+0xdc/0x100 [ 740.582661][T14855] ? splice_from_pipe+0x130/0x130 [ 740.587787][T14855] direct_splice_actor+0x118/0x180 [ 740.592906][T14855] splice_direct_to_actor+0x347/0xa30 [ 740.598287][T14855] ? folio_flags.constprop.0+0x150/0x150 [ 740.604104][T14855] ? vfs_splice_read+0x3b0/0x3b0 [ 740.609057][T14855] ? bpf_lsm_file_permission+0x9/0x10 [ 740.614448][T14855] ? security_file_permission+0x94/0x100 [ 740.620091][T14855] do_splice_direct+0x1af/0x280 [ 740.624970][T14855] ? splice_direct_to_actor+0xa30/0xa30 [ 740.630562][T14855] ? propagate_umount+0x1af0/0x1af0 [ 740.635768][T14855] ? bpf_lsm_file_permission+0x9/0x10 [ 740.641139][T14855] ? security_file_permission+0x94/0x100 [ 740.646788][T14855] do_sendfile+0xb88/0x1390 [ 740.651319][T14855] ? bit_wait_timeout+0x160/0x160 [ 740.656360][T14855] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 740.661663][T14855] __x64_sys_sendfile64+0x1d6/0x220 [ 740.666869][T14855] ? ksys_write+0x1a7/0x250 [ 740.671393][T14855] ? __ia32_sys_sendfile+0x220/0x220 [ 740.676690][T14855] ? syscall_enter_from_user_mode+0x26/0x80 [ 740.682611][T14855] do_syscall_64+0x38/0xb0 [ 740.687055][T14855] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 740.692989][T14855] RIP: 0033:0x7f64d1c7cae9 [ 740.697416][T14855] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 740.717113][T14855] RSP: 002b:00007f64d07fe0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 740.725617][T14855] RAX: ffffffffffffffda RBX: 00007f64d1d9c050 RCX: 00007f64d1c7cae9 [ 740.733604][T14855] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 740.741581][T14855] RBP: 00007f64d07fe120 R08: 0000000000000000 R09: 0000000000000000 [ 740.749548][T14855] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 740.757524][T14855] R13: 000000000000006e R14: 00007f64d1d9c050 R15: 00007f64d1ebfa48 [ 740.765503][T14855] [ 740.800637][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 740.899610][T14860] FAULT_INJECTION: forcing a failure. [ 740.899610][T14860] name failslab, interval 1, probability 0, space 0, times 0 [ 740.981524][T14860] CPU: 0 PID: 14860 Comm: syz-executor.2 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 740.992019][T14860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 741.002107][T14860] Call Trace: [ 741.005412][T14860] [ 741.008375][T14860] dump_stack_lvl+0x125/0x1b0 [ 741.013100][T14860] should_fail_ex+0x496/0x5b0 [ 741.017836][T14860] should_failslab+0x9/0x20 [ 741.022395][T14860] __kmem_cache_alloc_node+0x6b/0x350 [ 741.027813][T14860] ? skcipher_walk_next+0xf2d/0x1610 [ 741.033147][T14860] ? __crypto_xor+0x452/0x5f0 [ 741.037879][T14860] ? skcipher_walk_next+0xf2d/0x1610 [ 741.043208][T14860] __kmalloc+0x4c/0x100 [ 741.047417][T14860] skcipher_walk_next+0xf2d/0x1610 [ 741.052591][T14860] skcipher_walk_done+0x451/0xd60 [ 741.057667][T14860] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 741.063105][T14860] ctr_crypt+0x12e/0x280 [ 741.067506][T14860] ? xts_encrypt+0x20/0x20 [ 741.071979][T14860] ? shash_async_digest+0xb0/0xb0 [ 741.077072][T14860] ? crypto_rfc4309_encrypt+0x80/0x80 [ 741.082505][T14860] crypto_skcipher_encrypt+0xbc/0x100 [ 741.087914][T14860] crypto_skcipher_encrypt+0xbc/0x100 [ 741.093333][T14860] crypto_ccm_encrypt+0x37d/0x4c0 [ 741.098437][T14860] crypto_aead_encrypt+0xbc/0x100 [ 741.103527][T14860] tls_push_record+0x1bf3/0x31b0 [ 741.108546][T14860] ? tls_tx_records+0x6e0/0x6e0 [ 741.113444][T14860] ? sk_psock_get+0x146/0x470 [ 741.118189][T14860] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 741.123432][T14860] ? find_held_lock+0x2d/0x110 [ 741.128254][T14860] bpf_exec_tx_verdict+0xdba/0x11d0 [ 741.133510][T14860] ? page_ext_get+0x182/0x310 [ 741.138241][T14860] ? tls_push_record+0x31b0/0x31b0 [ 741.143498][T14860] ? __sk_mem_schedule+0xa7/0xe0 [ 741.148487][T14860] ? sk_msg_alloc+0x6e8/0xaa0 [ 741.153228][T14860] tls_sw_sendmsg+0xd3e/0x2ba0 [ 741.158068][T14860] ? tx_work_handler+0x230/0x230 [ 741.163058][T14860] ? aa_sk_perm+0x2c1/0xae0 [ 741.167605][T14860] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 741.173642][T14860] ? __mark_inode_dirty+0x68e/0xd50 [ 741.178895][T14860] ? reacquire_held_locks+0x20b/0x4b0 [ 741.184318][T14860] ? __mark_inode_dirty+0x68e/0xd50 [ 741.189530][T14860] inet6_sendmsg+0x9d/0xe0 [ 741.193956][T14860] ? inet6_compat_ioctl+0x350/0x350 [ 741.199344][T14860] sock_sendmsg+0xd9/0x180 [ 741.203965][T14860] splice_to_socket+0xade/0x1010 [ 741.208939][T14860] ? splice_from_pipe+0x130/0x130 [ 741.213971][T14860] ? atime_needs_update+0x720/0x720 [ 741.219188][T14860] ? shmem_file_read_iter+0xac0/0xac0 [ 741.224567][T14860] ? security_file_permission+0xdc/0x100 [ 741.230299][T14860] ? splice_from_pipe+0x130/0x130 [ 741.235349][T14860] direct_splice_actor+0x118/0x180 [ 741.240466][T14860] splice_direct_to_actor+0x347/0xa30 [ 741.245843][T14860] ? folio_flags.constprop.0+0x150/0x150 [ 741.251576][T14860] ? vfs_splice_read+0x3b0/0x3b0 [ 741.256518][T14860] ? bpf_lsm_file_permission+0x9/0x10 [ 741.261881][T14860] ? security_file_permission+0x94/0x100 [ 741.267517][T14860] do_splice_direct+0x1af/0x280 [ 741.272371][T14860] ? splice_direct_to_actor+0xa30/0xa30 [ 741.277922][T14860] ? propagate_umount+0x1af0/0x1af0 [ 741.283126][T14860] ? bpf_lsm_file_permission+0x9/0x10 [ 741.288497][T14860] ? security_file_permission+0x94/0x100 [ 741.294229][T14860] do_sendfile+0xb88/0x1390 [ 741.298749][T14860] ? bit_wait_timeout+0x160/0x160 [ 741.303861][T14860] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 741.309158][T14860] __x64_sys_sendfile64+0x1d6/0x220 [ 741.314367][T14860] ? ksys_write+0x1a7/0x250 [ 741.318875][T14860] ? __ia32_sys_sendfile+0x220/0x220 [ 741.324170][T14860] ? syscall_enter_from_user_mode+0x26/0x80 [ 741.330066][T14860] do_syscall_64+0x38/0xb0 [ 741.334479][T14860] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 741.340367][T14860] RIP: 0033:0x7f2752e7cae9 [ 741.344778][T14860] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 741.364388][T14860] RSP: 002b:00007f2753c220c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 741.372806][T14860] RAX: ffffffffffffffda RBX: 00007f2752f9c050 RCX: 00007f2752e7cae9 22:15:46 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 741.380773][T14860] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 741.388831][T14860] RBP: 00007f2753c22120 R08: 0000000000000000 R09: 0000000000000000 [ 741.396801][T14860] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 741.404855][T14860] R13: 000000000000006e R14: 00007f2752f9c050 R15: 00007f27530bfa48 [ 741.412832][T14860] [ 741.730964][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:47 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async, rerun: 32) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) (rerun: 32) r2 = dup(r1) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 32) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 32) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (rerun: 32) ftruncate(r2, 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) (async) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:47 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @local}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001f40)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000002640)="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", 0x1010}, {&(0x7f0000001bc0)="b2c474477734761b0ec762e59474460a10788e2c38b9511f56bf82e9e293943fc5c3bab1d7e3c3720403301c059bde3c6abf27908b3fa01f6a3e35bfd7a8b85384ec6c27cac0a281ce0bedeada5576693afdd232e03f4e7579276233b9dd3d9599416f6d18c63c636bbf46557158d886ae2f34cbefed4a331bf425143060c9563730c078d758d9330c00468371ca0914f002f5e77234194f00ead5edf46aa93a46ea5f26", 0xa4}, {&(0x7f0000000100)="6c3164bcd423f016e4e17607495c7088d4446b86050254b59f5a2608b284ac884a", 0x21}, {&(0x7f0000001600)="f5f229ecb180dbb468cb9805dc199ead0569238aec6cb4951ade852916afcece608e4538d34492113a9f43a440cb4b8821bcf501b02c68cc4909200545ed0a74b8198d6f2942c612da85818dbe8e531cdae1c950686a755ac1806715b8d56af0ef445cd0b1eac449f3bffbfee073394cbdef10387378d22b5eaccb57d6bbdceb159830a7503b75fdbca56d35829e5a05abb638cc67fa852ae9e5d7d512f4", 0x9e}, {&(0x7f00000016c0)="708a403cf4cd09fb7fe7f15af3adbbcf6a813a9477bc75b1eef81e9d1fc2673f2da4bd8147b87d413a58e5adc54a30f4346a03bf5c8150bdadbdd925c0678bac00fdc49235743db4d711099a8e8f701a25b8cc9ba910f6bf5230edc2ddd6d7d8eda507934926d20fee170ca5668dba72e77746b6ee6c", 0x76}, {&(0x7f0000001740)="fdaafef4e0f8a54255e7aa4b9f6c0b3246c673ae86f2266cc2a0e912debee2619e309d2932c2b6206fccbeabfbbea85665bce515b85fb801a3c680368059ea02a5f01add9cbad85095aac65f67ae8ae168cf841509ff628adb45d2ff231eaeb417c311d99bf87720e58ecf8247fb76e8ac9081c79c6a5ef7862f43397b4a4094948c83481777b88e35faa5ffb70bddae591f4d476bbdd73ed26fd4b13bd81a740d142a1344cd118eed6b1c280bfb3b74a8a9f580e3356b435ec1c21c26f5e80161e970ed666a9a3269", 0xc9}, {&(0x7f0000001840)="15d4d5aa19e5a3e562e859b8eee89fe8e8dd77b1a943e9d9dd05ea4288eb8579e6a68f00c29e05891a3a429833fb79eb21ac803f22e2fc93b0c1d6670d8b7716b8c3a94e8a768256b8c2231274b9a47e6f8f82f013bccebd0bf77a", 0x5b}, {&(0x7f00000018c0)="4a004d7bf86a7ee9a405ad6bae84b4ad52e2ee55465ceae8248207810ab88ba423fcdb81167af4828d100b7f7e52e3698da8c2af8965105dbdf259588e5d61bdb56c2195bb384f900597edf17d8b3c5484eb67af71094b55d0c222521ad764f15881df9d641b59788c44c311f4b7375b02340f835999fa2f981672ed87646002bc21c760e3ee5369a807cc7e65d26cf8ce9ceaaffd381ae29b5536e487cbf31220d3ffd0256092ffbaad7f2bda46afd959e3f82bdc6cf2e45c5fa304369695ac706b7c1c6241ef9894871f5fbec7f05a67e755b543326963e7d925d0a847c3", 0xdf}, {&(0x7f00000019c0)="6acce8f86775706628af36eae264c320d607ee18bc236694f9ae4b5e2e251c32c74cd738e5d385a46f7ea30f2887ccf008e1c41e3c8dd7bc1253d13b3f2695c928", 0x41}, {&(0x7f0000001a40)="9e08b2222d0676ebb030e678e385cdb5e700b4d3d77f2d054409d65048abc16823f3bf5c22f782c11f17de2439df40b6f7f7e66a54d30735ebf55627b2e8e5f262365876b23c30b8913d41ed2ba6fdcccae45af5134726feb79ae5dd79e2837db7a9e4afda84c6235cd722a1b096e32beaca5154984e46013ccbf054cb2de878825a772fe1b92c9f43aba156cda4cfdc6b6fad13cccc73450487182c53cddc17450c586973cd177b64a63b5dd699456d3d2b", 0xb2}, {&(0x7f0000000500)="1ddf9682a8ed1480d31b8294cab2af158b4b1ce0c8b5f9b5eff1035a5a37c737dae6ccc525032c21724a479bfaca32a9408d2ba6cff76ad5a2489113bc78a2740ffb80940d645a3fc5348592c1df783f67731cac5e599758bbb382e058010e1f8840173ea0343816927feb01ee2aa4a037c5d1ac7367e5518e05066c47def9cb1f753bfe4485de56a8f63d948ac9be949b8d29fd8bd802eece9f945ef7806940dcdd23e48cc23b00"/177, 0xb1}, {&(0x7f00000005c0)="fef00e4f204f6b8d35b7e0be17c766edd24c8a5855896a62eff14d0c098164205aea29", 0x23}], 0xc, &(0x7f00000008c0)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64, @ANYBLOB="36c8662658053549c81efa4144951a11fb0a224f932dca31bb5e85fb42b8d8dad99981a951dc09bd7fb421403daf50245ddbc9201a6fb6828887076d66897a2fc6b044a8c45a4d5157dc6c60720302d9137073d10ad2669e854b2ac38db4e3b6c7e6e55ab00a3e947396281eb7d9f9bc8925418422609415c5c22d0b3866dc0962a2a5d3012935bd27ea70c81e7866dbb3167c4110d957fd8533c3a8c368adaf812a7ba85abc665b5a54ddd7aa90affa1101b127606c7a791ee0b9bf288dfa08e99c4ed597d6e1dc022f768de4fdb6fb3bfc4bfb", @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=0x0, @ANYRES32, @ANYBLOB="1800000087ace69f02000000", @ANYRES8, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESHEX, @ANYRES32=0x0, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="18000000010000000200", @ANYRES32=0x0, @ANYRESDEC, @ANYRES16, @ANYBLOB="1c3b2a634b00000001000000ea80a43a9c5c67dc83134f1825e5e2da7eb6f994259850cddef4a1b87cd9fe729faf6555a6929e48a9467b4f4fbd2f75a309f4cb60313487820ec3701b5267626b1ba374458da4e578568b1a9140d4437a13438353124a3e94c808dd43969824c3ccfaedf7667aeed8356ad3c0e5653a838cc87a60fe8dc794a30e4d5578dd6299205351798efa566a44f83ddf0b35d075e2e0c834395d98a1fae9168deef686ffa2ce52ba475119adea081720f6aab7c5a23fdf17213b6174ef37452b30308284457cb772cdb2b0466d49ce2f55894221824087e8c6e9ab0e7d", @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYBLOB="3a0000000e6f90759522fd4c5ba72d310000ffff08000000a8cedb1e0f13829bf3daeda343d3cd42332488016d851538b1520a458e6fc7658fabee81be04fa6c3208ad1b52e7b7946e99faa97d0a1164d865138e2c02bf69fea4f14eb363b241c0a1b1b48e4a2fa21c062e5ad3c79fc218698c6e8c6162acd1ec07a6bd8c1f33b79aee16ec19d9710e894febeb3efd7e1c0f09004309ac73075c9cc84945a7ba9905009af2bcff265b01556b06fc0434e52259ea63bd46a4994a19246c581eb79078ff348a7d4f141f9175763291d0bb285a01c628696c69bd000000000000000229db31b2412097f5c7ec1730eedf05108c4210784a66a052", @ANYRESHEX, @ANYRES32=0x0, @ANYRES32], 0x10c, 0x4000000}, 0xc20c0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000800)=0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000840)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './bus\x00'}) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) r10 = socket$bt_bnep(0x1f, 0x3, 0x4) r11 = gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000001c0)="cfbcae78cc4cdd58c592ffdc", 0xc}, {&(0x7f0000000200)="41627c703e8c248265ea6ea696e08416503ec3ef4d7b3c062e60994bd7bf0449a49ba5c626490bb688804fb702a4e5ee59956d53fbdfa087ea71142368aacd225146099ceaca3cde3edc65826bafb487a246267414adab35929fd4da44bdc20d7acf432d302ddc4a9e8d4d58621f68b03f816425a330dc73111753b96045f96d9fc929c33b80dceff773b7ca75fbcc2b39392c0fd02dacc57e4eba85aa21150e532508c62159b265744ecebd10", 0xad}, {&(0x7f00000003c0)="ecfb197f1aa217f46b76053c803e3e40f5a1c6bc8e2a3487f5cd44154d75eef3f1d407e8a406ecfd2fd8718ce36cb64d2ee29a7453d48a184ecafe8d3cde946a449a0d53615fb075a8b87569c705aa0eaaa71b83dd8b8aaebf1bd54cda863cb5a472bd628ab0805be3098f15d3436cda0fe14a92f61fcdd8a8b26d77fe58600104924afd4fc53a7cd31b52", 0x8b}, {&(0x7f0000000480)="de6a149439a89515678f2bda1d07da4bdcfcd9c9d8f8ba9ee47a1f7cdd17019c57616dfff174eeee0cc11156bf0002b1f67d421f3b6077f5732ce30d35735c29217d7da4d38d5b7c274303193b57708e096359b62a2f497f41d6d9205c043d97efba381f258ff3122c3e7f39d972eedca3bd39e51358582cd9e9ec3dede38fefff0689f89edcde6b4c4cd41d829c9098c5179f66ef3b7b06f8a4183868842af502d916ad7700b9b2cbd68b3e0e9fc02e4755f62acd1ad1ce92a7a4ba5b", 0xbd}, {&(0x7f0000000540)="7eecf03e036da906db7d01eab8182a96becbe5095e647c3601257039e82c678259d31574833312bf26f950801de2b7cc3b04153c3ed95881e8359a2806a7b36edc049710476d6174ec584a87c3da42bad6ea3ad143b175e1f3c054bed9fa9abff81e5e563a1685de2049648d2274f786b3a79f30ef3ef02bf53a21aba196c007fb9b18e8e662a982acfbac33c4381741187b12eaf7cf6cfc0311", 0x9a}, {&(0x7f00000002c0)="a3013db15aa9635314fa865e7fb33ea3c7b3f11e91005e943a3d9e48bfde54141d30b1ea1e8d7c1243853577777739955003f79f3f88ee1e420cbadf", 0x3c}, {&(0x7f0000000340)="d7e2e1890564e0c92a2bbc57f5f018cf03dd7ff6213c1342bc482e66774a2545c4b8c1d53d9a7bff", 0x28}], 0x7, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @rights={{0x34, 0x1, 0x1, [r1, r4, r7, r8, r0, r5, r9, r10, r1]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee00}}}], 0xd8, 0x40000}}], 0x1, 0x4048010) open(&(0x7f0000000100)='./bus\x00', 0x6d690c21ed12d2af, 0xa0) r12 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r12, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:47 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 6) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:47 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDMKTONE(r5, 0x4b30, 0x3) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:47 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) (async) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @local}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001f40)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000002640)="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", 0x1010}, {&(0x7f0000001bc0)="b2c474477734761b0ec762e59474460a10788e2c38b9511f56bf82e9e293943fc5c3bab1d7e3c3720403301c059bde3c6abf27908b3fa01f6a3e35bfd7a8b85384ec6c27cac0a281ce0bedeada5576693afdd232e03f4e7579276233b9dd3d9599416f6d18c63c636bbf46557158d886ae2f34cbefed4a331bf425143060c9563730c078d758d9330c00468371ca0914f002f5e77234194f00ead5edf46aa93a46ea5f26", 0xa4}, {&(0x7f0000000100)="6c3164bcd423f016e4e17607495c7088d4446b86050254b59f5a2608b284ac884a", 0x21}, {&(0x7f0000001600)="f5f229ecb180dbb468cb9805dc199ead0569238aec6cb4951ade852916afcece608e4538d34492113a9f43a440cb4b8821bcf501b02c68cc4909200545ed0a74b8198d6f2942c612da85818dbe8e531cdae1c950686a755ac1806715b8d56af0ef445cd0b1eac449f3bffbfee073394cbdef10387378d22b5eaccb57d6bbdceb159830a7503b75fdbca56d35829e5a05abb638cc67fa852ae9e5d7d512f4", 0x9e}, {&(0x7f00000016c0)="708a403cf4cd09fb7fe7f15af3adbbcf6a813a9477bc75b1eef81e9d1fc2673f2da4bd8147b87d413a58e5adc54a30f4346a03bf5c8150bdadbdd925c0678bac00fdc49235743db4d711099a8e8f701a25b8cc9ba910f6bf5230edc2ddd6d7d8eda507934926d20fee170ca5668dba72e77746b6ee6c", 0x76}, {&(0x7f0000001740)="fdaafef4e0f8a54255e7aa4b9f6c0b3246c673ae86f2266cc2a0e912debee2619e309d2932c2b6206fccbeabfbbea85665bce515b85fb801a3c680368059ea02a5f01add9cbad85095aac65f67ae8ae168cf841509ff628adb45d2ff231eaeb417c311d99bf87720e58ecf8247fb76e8ac9081c79c6a5ef7862f43397b4a4094948c83481777b88e35faa5ffb70bddae591f4d476bbdd73ed26fd4b13bd81a740d142a1344cd118eed6b1c280bfb3b74a8a9f580e3356b435ec1c21c26f5e80161e970ed666a9a3269", 0xc9}, {&(0x7f0000001840)="15d4d5aa19e5a3e562e859b8eee89fe8e8dd77b1a943e9d9dd05ea4288eb8579e6a68f00c29e05891a3a429833fb79eb21ac803f22e2fc93b0c1d6670d8b7716b8c3a94e8a768256b8c2231274b9a47e6f8f82f013bccebd0bf77a", 0x5b}, {&(0x7f00000018c0)="4a004d7bf86a7ee9a405ad6bae84b4ad52e2ee55465ceae8248207810ab88ba423fcdb81167af4828d100b7f7e52e3698da8c2af8965105dbdf259588e5d61bdb56c2195bb384f900597edf17d8b3c5484eb67af71094b55d0c222521ad764f15881df9d641b59788c44c311f4b7375b02340f835999fa2f981672ed87646002bc21c760e3ee5369a807cc7e65d26cf8ce9ceaaffd381ae29b5536e487cbf31220d3ffd0256092ffbaad7f2bda46afd959e3f82bdc6cf2e45c5fa304369695ac706b7c1c6241ef9894871f5fbec7f05a67e755b543326963e7d925d0a847c3", 0xdf}, {&(0x7f00000019c0)="6acce8f86775706628af36eae264c320d607ee18bc236694f9ae4b5e2e251c32c74cd738e5d385a46f7ea30f2887ccf008e1c41e3c8dd7bc1253d13b3f2695c928", 0x41}, {&(0x7f0000001a40)="9e08b2222d0676ebb030e678e385cdb5e700b4d3d77f2d054409d65048abc16823f3bf5c22f782c11f17de2439df40b6f7f7e66a54d30735ebf55627b2e8e5f262365876b23c30b8913d41ed2ba6fdcccae45af5134726feb79ae5dd79e2837db7a9e4afda84c6235cd722a1b096e32beaca5154984e46013ccbf054cb2de878825a772fe1b92c9f43aba156cda4cfdc6b6fad13cccc73450487182c53cddc17450c586973cd177b64a63b5dd699456d3d2b", 0xb2}, {&(0x7f0000000500)="1ddf9682a8ed1480d31b8294cab2af158b4b1ce0c8b5f9b5eff1035a5a37c737dae6ccc525032c21724a479bfaca32a9408d2ba6cff76ad5a2489113bc78a2740ffb80940d645a3fc5348592c1df783f67731cac5e599758bbb382e058010e1f8840173ea0343816927feb01ee2aa4a037c5d1ac7367e5518e05066c47def9cb1f753bfe4485de56a8f63d948ac9be949b8d29fd8bd802eece9f945ef7806940dcdd23e48cc23b00"/177, 0xb1}, {&(0x7f00000005c0)="fef00e4f204f6b8d35b7e0be17c766edd24c8a5855896a62eff14d0c098164205aea29", 0x23}], 0xc, &(0x7f00000008c0)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64, @ANYBLOB="36c8662658053549c81efa4144951a11fb0a224f932dca31bb5e85fb42b8d8dad99981a951dc09bd7fb421403daf50245ddbc9201a6fb6828887076d66897a2fc6b044a8c45a4d5157dc6c60720302d9137073d10ad2669e854b2ac38db4e3b6c7e6e55ab00a3e947396281eb7d9f9bc8925418422609415c5c22d0b3866dc0962a2a5d3012935bd27ea70c81e7866dbb3167c4110d957fd8533c3a8c368adaf812a7ba85abc665b5a54ddd7aa90affa1101b127606c7a791ee0b9bf288dfa08e99c4ed597d6e1dc022f768de4fdb6fb3bfc4bfb", @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=0x0, @ANYRES32, @ANYBLOB="1800000087ace69f02000000", @ANYRES8, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESHEX, @ANYRES32=0x0, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="18000000010000000200", @ANYRES32=0x0, @ANYRESDEC, @ANYRES16, @ANYBLOB="1c3b2a634b00000001000000ea80a43a9c5c67dc83134f1825e5e2da7eb6f994259850cddef4a1b87cd9fe729faf6555a6929e48a9467b4f4fbd2f75a309f4cb60313487820ec3701b5267626b1ba374458da4e578568b1a9140d4437a13438353124a3e94c808dd43969824c3ccfaedf7667aeed8356ad3c0e5653a838cc87a60fe8dc794a30e4d5578dd6299205351798efa566a44f83ddf0b35d075e2e0c834395d98a1fae9168deef686ffa2ce52ba475119adea081720f6aab7c5a23fdf17213b6174ef37452b30308284457cb772cdb2b0466d49ce2f55894221824087e8c6e9ab0e7d", @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYBLOB="3a0000000e6f90759522fd4c5ba72d310000ffff08000000a8cedb1e0f13829bf3daeda343d3cd42332488016d851538b1520a458e6fc7658fabee81be04fa6c3208ad1b52e7b7946e99faa97d0a1164d865138e2c02bf69fea4f14eb363b241c0a1b1b48e4a2fa21c062e5ad3c79fc218698c6e8c6162acd1ec07a6bd8c1f33b79aee16ec19d9710e894febeb3efd7e1c0f09004309ac73075c9cc84945a7ba9905009af2bcff265b01556b06fc0434e52259ea63bd46a4994a19246c581eb79078ff348a7d4f141f9175763291d0bb285a01c628696c69bd000000000000000229db31b2412097f5c7ec1730eedf05108c4210784a66a052", @ANYRESHEX, @ANYRES32=0x0, @ANYRES32], 0x10c, 0x4000000}, 0xc20c0) (async) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000800)=0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000840)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './bus\x00'}) (async) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) (async) sendmsg$NFT_BATCH(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) (async) r10 = socket$bt_bnep(0x1f, 0x3, 0x4) (async) r11 = gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000001c0)="cfbcae78cc4cdd58c592ffdc", 0xc}, {&(0x7f0000000200)="41627c703e8c248265ea6ea696e08416503ec3ef4d7b3c062e60994bd7bf0449a49ba5c626490bb688804fb702a4e5ee59956d53fbdfa087ea71142368aacd225146099ceaca3cde3edc65826bafb487a246267414adab35929fd4da44bdc20d7acf432d302ddc4a9e8d4d58621f68b03f816425a330dc73111753b96045f96d9fc929c33b80dceff773b7ca75fbcc2b39392c0fd02dacc57e4eba85aa21150e532508c62159b265744ecebd10", 0xad}, {&(0x7f00000003c0)="ecfb197f1aa217f46b76053c803e3e40f5a1c6bc8e2a3487f5cd44154d75eef3f1d407e8a406ecfd2fd8718ce36cb64d2ee29a7453d48a184ecafe8d3cde946a449a0d53615fb075a8b87569c705aa0eaaa71b83dd8b8aaebf1bd54cda863cb5a472bd628ab0805be3098f15d3436cda0fe14a92f61fcdd8a8b26d77fe58600104924afd4fc53a7cd31b52", 0x8b}, {&(0x7f0000000480)="de6a149439a89515678f2bda1d07da4bdcfcd9c9d8f8ba9ee47a1f7cdd17019c57616dfff174eeee0cc11156bf0002b1f67d421f3b6077f5732ce30d35735c29217d7da4d38d5b7c274303193b57708e096359b62a2f497f41d6d9205c043d97efba381f258ff3122c3e7f39d972eedca3bd39e51358582cd9e9ec3dede38fefff0689f89edcde6b4c4cd41d829c9098c5179f66ef3b7b06f8a4183868842af502d916ad7700b9b2cbd68b3e0e9fc02e4755f62acd1ad1ce92a7a4ba5b", 0xbd}, {&(0x7f0000000540)="7eecf03e036da906db7d01eab8182a96becbe5095e647c3601257039e82c678259d31574833312bf26f950801de2b7cc3b04153c3ed95881e8359a2806a7b36edc049710476d6174ec584a87c3da42bad6ea3ad143b175e1f3c054bed9fa9abff81e5e563a1685de2049648d2274f786b3a79f30ef3ef02bf53a21aba196c007fb9b18e8e662a982acfbac33c4381741187b12eaf7cf6cfc0311", 0x9a}, {&(0x7f00000002c0)="a3013db15aa9635314fa865e7fb33ea3c7b3f11e91005e943a3d9e48bfde54141d30b1ea1e8d7c1243853577777739955003f79f3f88ee1e420cbadf", 0x3c}, {&(0x7f0000000340)="d7e2e1890564e0c92a2bbc57f5f018cf03dd7ff6213c1342bc482e66774a2545c4b8c1d53d9a7bff", 0x28}], 0x7, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @rights={{0x34, 0x1, 0x1, [r1, r4, r7, r8, r0, r5, r9, r10, r1]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee00}}}], 0xd8, 0x40000}}], 0x1, 0x4048010) (async) open(&(0x7f0000000100)='./bus\x00', 0x6d690c21ed12d2af, 0xa0) r12 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r12, 0x208200) (async) sendfile(r5, r3, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 742.665504][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 742.683781][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:47 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) (async) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @local}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001f40)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000002640)="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", 0x1010}, {&(0x7f0000001bc0)="b2c474477734761b0ec762e59474460a10788e2c38b9511f56bf82e9e293943fc5c3bab1d7e3c3720403301c059bde3c6abf27908b3fa01f6a3e35bfd7a8b85384ec6c27cac0a281ce0bedeada5576693afdd232e03f4e7579276233b9dd3d9599416f6d18c63c636bbf46557158d886ae2f34cbefed4a331bf425143060c9563730c078d758d9330c00468371ca0914f002f5e77234194f00ead5edf46aa93a46ea5f26", 0xa4}, {&(0x7f0000000100)="6c3164bcd423f016e4e17607495c7088d4446b86050254b59f5a2608b284ac884a", 0x21}, {&(0x7f0000001600)="f5f229ecb180dbb468cb9805dc199ead0569238aec6cb4951ade852916afcece608e4538d34492113a9f43a440cb4b8821bcf501b02c68cc4909200545ed0a74b8198d6f2942c612da85818dbe8e531cdae1c950686a755ac1806715b8d56af0ef445cd0b1eac449f3bffbfee073394cbdef10387378d22b5eaccb57d6bbdceb159830a7503b75fdbca56d35829e5a05abb638cc67fa852ae9e5d7d512f4", 0x9e}, {&(0x7f00000016c0)="708a403cf4cd09fb7fe7f15af3adbbcf6a813a9477bc75b1eef81e9d1fc2673f2da4bd8147b87d413a58e5adc54a30f4346a03bf5c8150bdadbdd925c0678bac00fdc49235743db4d711099a8e8f701a25b8cc9ba910f6bf5230edc2ddd6d7d8eda507934926d20fee170ca5668dba72e77746b6ee6c", 0x76}, {&(0x7f0000001740)="fdaafef4e0f8a54255e7aa4b9f6c0b3246c673ae86f2266cc2a0e912debee2619e309d2932c2b6206fccbeabfbbea85665bce515b85fb801a3c680368059ea02a5f01add9cbad85095aac65f67ae8ae168cf841509ff628adb45d2ff231eaeb417c311d99bf87720e58ecf8247fb76e8ac9081c79c6a5ef7862f43397b4a4094948c83481777b88e35faa5ffb70bddae591f4d476bbdd73ed26fd4b13bd81a740d142a1344cd118eed6b1c280bfb3b74a8a9f580e3356b435ec1c21c26f5e80161e970ed666a9a3269", 0xc9}, {&(0x7f0000001840)="15d4d5aa19e5a3e562e859b8eee89fe8e8dd77b1a943e9d9dd05ea4288eb8579e6a68f00c29e05891a3a429833fb79eb21ac803f22e2fc93b0c1d6670d8b7716b8c3a94e8a768256b8c2231274b9a47e6f8f82f013bccebd0bf77a", 0x5b}, {&(0x7f00000018c0)="4a004d7bf86a7ee9a405ad6bae84b4ad52e2ee55465ceae8248207810ab88ba423fcdb81167af4828d100b7f7e52e3698da8c2af8965105dbdf259588e5d61bdb56c2195bb384f900597edf17d8b3c5484eb67af71094b55d0c222521ad764f15881df9d641b59788c44c311f4b7375b02340f835999fa2f981672ed87646002bc21c760e3ee5369a807cc7e65d26cf8ce9ceaaffd381ae29b5536e487cbf31220d3ffd0256092ffbaad7f2bda46afd959e3f82bdc6cf2e45c5fa304369695ac706b7c1c6241ef9894871f5fbec7f05a67e755b543326963e7d925d0a847c3", 0xdf}, {&(0x7f00000019c0)="6acce8f86775706628af36eae264c320d607ee18bc236694f9ae4b5e2e251c32c74cd738e5d385a46f7ea30f2887ccf008e1c41e3c8dd7bc1253d13b3f2695c928", 0x41}, {&(0x7f0000001a40)="9e08b2222d0676ebb030e678e385cdb5e700b4d3d77f2d054409d65048abc16823f3bf5c22f782c11f17de2439df40b6f7f7e66a54d30735ebf55627b2e8e5f262365876b23c30b8913d41ed2ba6fdcccae45af5134726feb79ae5dd79e2837db7a9e4afda84c6235cd722a1b096e32beaca5154984e46013ccbf054cb2de878825a772fe1b92c9f43aba156cda4cfdc6b6fad13cccc73450487182c53cddc17450c586973cd177b64a63b5dd699456d3d2b", 0xb2}, {&(0x7f0000000500)="1ddf9682a8ed1480d31b8294cab2af158b4b1ce0c8b5f9b5eff1035a5a37c737dae6ccc525032c21724a479bfaca32a9408d2ba6cff76ad5a2489113bc78a2740ffb80940d645a3fc5348592c1df783f67731cac5e599758bbb382e058010e1f8840173ea0343816927feb01ee2aa4a037c5d1ac7367e5518e05066c47def9cb1f753bfe4485de56a8f63d948ac9be949b8d29fd8bd802eece9f945ef7806940dcdd23e48cc23b00"/177, 0xb1}, {&(0x7f00000005c0)="fef00e4f204f6b8d35b7e0be17c766edd24c8a5855896a62eff14d0c098164205aea29", 0x23}], 0xc, &(0x7f00000008c0)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64, @ANYBLOB="36c8662658053549c81efa4144951a11fb0a224f932dca31bb5e85fb42b8d8dad99981a951dc09bd7fb421403daf50245ddbc9201a6fb6828887076d66897a2fc6b044a8c45a4d5157dc6c60720302d9137073d10ad2669e854b2ac38db4e3b6c7e6e55ab00a3e947396281eb7d9f9bc8925418422609415c5c22d0b3866dc0962a2a5d3012935bd27ea70c81e7866dbb3167c4110d957fd8533c3a8c368adaf812a7ba85abc665b5a54ddd7aa90affa1101b127606c7a791ee0b9bf288dfa08e99c4ed597d6e1dc022f768de4fdb6fb3bfc4bfb", @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=0x0, @ANYRES32, @ANYBLOB="1800000087ace69f02000000", @ANYRES8, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRESHEX, @ANYRES32=0x0, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB="18000000010000000200", @ANYRES32=0x0, @ANYRESDEC, @ANYRES16, @ANYBLOB="1c3b2a634b00000001000000ea80a43a9c5c67dc83134f1825e5e2da7eb6f994259850cddef4a1b87cd9fe729faf6555a6929e48a9467b4f4fbd2f75a309f4cb60313487820ec3701b5267626b1ba374458da4e578568b1a9140d4437a13438353124a3e94c808dd43969824c3ccfaedf7667aeed8356ad3c0e5653a838cc87a60fe8dc794a30e4d5578dd6299205351798efa566a44f83ddf0b35d075e2e0c834395d98a1fae9168deef686ffa2ce52ba475119adea081720f6aab7c5a23fdf17213b6174ef37452b30308284457cb772cdb2b0466d49ce2f55894221824087e8c6e9ab0e7d", @ANYRES32, @ANYRES32, @ANYRES16, @ANYRES32, @ANYBLOB="3a0000000e6f90759522fd4c5ba72d310000ffff08000000a8cedb1e0f13829bf3daeda343d3cd42332488016d851538b1520a458e6fc7658fabee81be04fa6c3208ad1b52e7b7946e99faa97d0a1164d865138e2c02bf69fea4f14eb363b241c0a1b1b48e4a2fa21c062e5ad3c79fc218698c6e8c6162acd1ec07a6bd8c1f33b79aee16ec19d9710e894febeb3efd7e1c0f09004309ac73075c9cc84945a7ba9905009af2bcff265b01556b06fc0434e52259ea63bd46a4994a19246c581eb79078ff348a7d4f141f9175763291d0bb285a01c628696c69bd000000000000000229db31b2412097f5c7ec1730eedf05108c4210784a66a052", @ANYRESHEX, @ANYRES32=0x0, @ANYRES32], 0x10c, 0x4000000}, 0xc20c0) (async) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000800)=0x0) (async) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f0000000840)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './bus\x00'}) (async) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) (async) sendmsg$NFT_BATCH(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) r10 = socket$bt_bnep(0x1f, 0x3, 0x4) (async, rerun: 64) r11 = gettid() (rerun: 64) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000001c0)="cfbcae78cc4cdd58c592ffdc", 0xc}, {&(0x7f0000000200)="41627c703e8c248265ea6ea696e08416503ec3ef4d7b3c062e60994bd7bf0449a49ba5c626490bb688804fb702a4e5ee59956d53fbdfa087ea71142368aacd225146099ceaca3cde3edc65826bafb487a246267414adab35929fd4da44bdc20d7acf432d302ddc4a9e8d4d58621f68b03f816425a330dc73111753b96045f96d9fc929c33b80dceff773b7ca75fbcc2b39392c0fd02dacc57e4eba85aa21150e532508c62159b265744ecebd10", 0xad}, {&(0x7f00000003c0)="ecfb197f1aa217f46b76053c803e3e40f5a1c6bc8e2a3487f5cd44154d75eef3f1d407e8a406ecfd2fd8718ce36cb64d2ee29a7453d48a184ecafe8d3cde946a449a0d53615fb075a8b87569c705aa0eaaa71b83dd8b8aaebf1bd54cda863cb5a472bd628ab0805be3098f15d3436cda0fe14a92f61fcdd8a8b26d77fe58600104924afd4fc53a7cd31b52", 0x8b}, {&(0x7f0000000480)="de6a149439a89515678f2bda1d07da4bdcfcd9c9d8f8ba9ee47a1f7cdd17019c57616dfff174eeee0cc11156bf0002b1f67d421f3b6077f5732ce30d35735c29217d7da4d38d5b7c274303193b57708e096359b62a2f497f41d6d9205c043d97efba381f258ff3122c3e7f39d972eedca3bd39e51358582cd9e9ec3dede38fefff0689f89edcde6b4c4cd41d829c9098c5179f66ef3b7b06f8a4183868842af502d916ad7700b9b2cbd68b3e0e9fc02e4755f62acd1ad1ce92a7a4ba5b", 0xbd}, {&(0x7f0000000540)="7eecf03e036da906db7d01eab8182a96becbe5095e647c3601257039e82c678259d31574833312bf26f950801de2b7cc3b04153c3ed95881e8359a2806a7b36edc049710476d6174ec584a87c3da42bad6ea3ad143b175e1f3c054bed9fa9abff81e5e563a1685de2049648d2274f786b3a79f30ef3ef02bf53a21aba196c007fb9b18e8e662a982acfbac33c4381741187b12eaf7cf6cfc0311", 0x9a}, {&(0x7f00000002c0)="a3013db15aa9635314fa865e7fb33ea3c7b3f11e91005e943a3d9e48bfde54141d30b1ea1e8d7c1243853577777739955003f79f3f88ee1e420cbadf", 0x3c}, {&(0x7f0000000340)="d7e2e1890564e0c92a2bbc57f5f018cf03dd7ff6213c1342bc482e66774a2545c4b8c1d53d9a7bff", 0x28}], 0x7, &(0x7f0000000880)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee00}}}, @rights={{0x34, 0x1, 0x1, [r1, r4, r7, r8, r0, r5, r9, r10, r1]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee00}}}], 0xd8, 0x40000}}], 0x1, 0x4048010) (async) open(&(0x7f0000000100)='./bus\x00', 0x6d690c21ed12d2af, 0xa0) (async) r12 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r12, 0x208200) (async) sendfile(r5, r3, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 742.850461][T14880] FAULT_INJECTION: forcing a failure. [ 742.850461][T14880] name failslab, interval 1, probability 0, space 0, times 0 [ 742.952713][T14880] CPU: 1 PID: 14880 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 742.963210][T14880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 742.973308][T14880] Call Trace: [ 742.976622][T14880] [ 742.979585][T14880] dump_stack_lvl+0x125/0x1b0 [ 742.984319][T14880] should_fail_ex+0x496/0x5b0 [ 742.989056][T14880] should_failslab+0x9/0x20 [ 742.993568][T14880] kmem_cache_alloc_node+0x389/0x3f0 [ 742.998856][T14880] ? __alloc_skb+0x287/0x330 [ 743.003451][T14880] __alloc_skb+0x287/0x330 [ 743.007870][T14880] ? __napi_build_skb+0x50/0x50 [ 743.012747][T14880] tcp_stream_alloc_skb+0x34/0x560 [ 743.017883][T14880] tcp_sendmsg_locked+0xf47/0x3420 [ 743.023006][T14880] ? scatterwalk_copychunks+0x22c/0x560 [ 743.028560][T14880] ? tcp_sendmsg_fastopen+0x720/0x720 [ 743.033931][T14880] ? skcipher_walk_done+0x458/0xd60 [ 743.039168][T14880] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 743.045358][T14880] tls_push_sg+0x24a/0x730 [ 743.049848][T14880] ? wait_on_pending_writer+0x4b0/0x4b0 [ 743.055427][T14880] ? crypto_skcipher_encrypt+0xc3/0x100 [ 743.061003][T14880] tls_tx_records+0x343/0x6e0 [ 743.065726][T14880] tls_push_record+0x2059/0x31b0 [ 743.070694][T14880] ? tls_tx_records+0x6e0/0x6e0 [ 743.075564][T14880] ? sk_psock_get+0x146/0x470 [ 743.080247][T14880] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 743.085444][T14880] ? find_held_lock+0x2d/0x110 [ 743.090213][T14880] bpf_exec_tx_verdict+0xdba/0x11d0 [ 743.095414][T14880] ? page_ext_get+0x182/0x310 [ 743.100117][T14880] ? tls_push_record+0x31b0/0x31b0 [ 743.105280][T14880] ? __sk_mem_schedule+0xa7/0xe0 [ 743.110219][T14880] ? sk_msg_alloc+0x6e8/0xaa0 [ 743.114920][T14880] tls_sw_sendmsg+0xd3e/0x2ba0 [ 743.119728][T14880] ? tx_work_handler+0x230/0x230 [ 743.124680][T14880] ? aa_sk_perm+0x2c1/0xae0 [ 743.129192][T14880] ? lockdep_hardirqs_on+0x7d/0x100 [ 743.134402][T14880] ? asm_sysvec_reschedule_ipi+0x1a/0x20 [ 743.140041][T14880] inet6_sendmsg+0x9d/0xe0 [ 743.144459][T14880] ? inet6_compat_ioctl+0x350/0x350 [ 743.149747][T14880] sock_sendmsg+0xd9/0x180 [ 743.154182][T14880] splice_to_socket+0xade/0x1010 [ 743.159136][T14880] ? splice_from_pipe+0x130/0x130 [ 743.164172][T14880] ? atime_needs_update+0x720/0x720 [ 743.169393][T14880] ? shmem_file_read_iter+0xac0/0xac0 [ 743.174766][T14880] ? security_file_permission+0xdc/0x100 [ 743.180415][T14880] ? splice_from_pipe+0x130/0x130 [ 743.185450][T14880] direct_splice_actor+0x118/0x180 [ 743.190567][T14880] splice_direct_to_actor+0x347/0xa30 [ 743.195946][T14880] ? folio_flags.constprop.0+0x150/0x150 [ 743.201589][T14880] ? vfs_splice_read+0x3b0/0x3b0 [ 743.206530][T14880] ? bpf_lsm_file_permission+0x9/0x10 [ 743.211902][T14880] ? security_file_permission+0x94/0x100 [ 743.217550][T14880] do_splice_direct+0x1af/0x280 [ 743.222403][T14880] ? splice_direct_to_actor+0xa30/0xa30 [ 743.227952][T14880] ? propagate_umount+0x1af0/0x1af0 [ 743.233164][T14880] ? bpf_lsm_file_permission+0x9/0x10 [ 743.238531][T14880] ? security_file_permission+0x94/0x100 [ 743.244174][T14880] do_sendfile+0xb88/0x1390 [ 743.248684][T14880] ? rcu_is_watching+0x12/0xb0 [ 743.253454][T14880] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 743.258744][T14880] ? __do_sys_rseq+0x750/0x750 [ 743.263513][T14880] __x64_sys_sendfile64+0x1d6/0x220 [ 743.268733][T14880] ? ksys_write+0x1a7/0x250 [ 743.273242][T14880] ? __ia32_sys_sendfile+0x220/0x220 [ 743.278537][T14880] ? syscall_enter_from_user_mode+0x26/0x80 [ 743.284444][T14880] do_syscall_64+0x38/0xb0 [ 743.288857][T14880] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 743.294749][T14880] RIP: 0033:0x7f376ce7cae9 [ 743.299159][T14880] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 743.318766][T14880] RSP: 002b:00007f376dc9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 743.327182][T14880] RAX: ffffffffffffffda RBX: 00007f376cf9c050 RCX: 00007f376ce7cae9 [ 743.335170][T14880] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 743.343221][T14880] RBP: 00007f376dc9c120 R08: 0000000000000000 R09: 0000000000000000 [ 743.351187][T14880] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 743.359158][T14880] R13: 000000000000006e R14: 00007f376cf9c050 R15: 00007f376d0bfa48 [ 743.367134][T14880] 22:15:48 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 6) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:48 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x10, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:48 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 6) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 743.660775][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 743.690849][T14898] FAULT_INJECTION: forcing a failure. [ 743.690849][T14898] name failslab, interval 1, probability 0, space 0, times 0 [ 743.732283][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 743.883996][T14900] FAULT_INJECTION: forcing a failure. [ 743.883996][T14900] name failslab, interval 1, probability 0, space 0, times 0 [ 743.923818][T14898] CPU: 0 PID: 14898 Comm: syz-executor.5 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 743.934326][T14898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 743.944420][T14898] Call Trace: [ 743.947724][T14898] [ 743.950680][T14898] dump_stack_lvl+0x125/0x1b0 [ 743.955404][T14898] should_fail_ex+0x496/0x5b0 [ 743.960135][T14898] should_failslab+0x9/0x20 [ 743.964867][T14898] kmem_cache_alloc_node+0x389/0x3f0 [ 743.970629][T14898] ? __alloc_skb+0x287/0x330 [ 743.975361][T14898] __alloc_skb+0x287/0x330 [ 743.979918][T14898] ? __napi_build_skb+0x50/0x50 [ 743.984830][T14898] tcp_stream_alloc_skb+0x34/0x560 [ 743.989995][T14898] tcp_sendmsg_locked+0xf47/0x3420 [ 743.995171][T14898] ? scatterwalk_copychunks+0x22c/0x560 [ 744.000776][T14898] ? tcp_sendmsg_fastopen+0x720/0x720 [ 744.006192][T14898] ? skcipher_walk_done+0x458/0xd60 [ 744.011461][T14898] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 744.016924][T14898] tls_push_sg+0x24a/0x730 [ 744.021410][T14898] ? wait_on_pending_writer+0x4b0/0x4b0 [ 744.027024][T14898] ? crypto_skcipher_encrypt+0xc3/0x100 [ 744.032623][T14898] tls_tx_records+0x343/0x6e0 [ 744.037354][T14898] tls_push_record+0x2059/0x31b0 [ 744.042361][T14898] ? tls_tx_records+0x6e0/0x6e0 [ 744.047263][T14898] ? sk_psock_get+0x146/0x470 [ 744.051996][T14898] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 744.057245][T14898] ? reacquire_held_locks+0x4b0/0x4b0 [ 744.062665][T14898] ? find_held_lock+0x2d/0x110 [ 744.067480][T14898] bpf_exec_tx_verdict+0xdba/0x11d0 [ 744.072725][T14898] ? finish_task_switch.isra.0+0x216/0xc90 [ 744.078580][T14898] ? finish_task_switch.isra.0+0x2eb/0xc90 [ 744.084427][T14898] ? __switch_to+0x5da/0xfa0 [ 744.089069][T14898] ? tls_push_record+0x31b0/0x31b0 [ 744.094231][T14898] ? __schedule+0xee9/0x59f0 [ 744.098943][T14898] ? __sk_mem_schedule+0xa7/0xe0 [ 744.103922][T14898] ? sk_msg_alloc+0x6e8/0xaa0 [ 744.108663][T14898] tls_sw_sendmsg+0xd3e/0x2ba0 [ 744.113504][T14898] ? tx_work_handler+0x230/0x230 [ 744.118485][T14898] ? preempt_schedule_irq+0x79/0x90 [ 744.123737][T14898] ? asm_sysvec_reschedule_ipi+0x1a/0x20 [ 744.129422][T14898] ? asm_sysvec_reschedule_ipi+0x1a/0x20 [ 744.135122][T14898] inet6_sendmsg+0x9d/0xe0 [ 744.139602][T14898] ? inet6_compat_ioctl+0x350/0x350 [ 744.144864][T14898] sock_sendmsg+0xd9/0x180 [ 744.149331][T14898] splice_to_socket+0xade/0x1010 [ 744.154439][T14898] ? splice_from_pipe+0x130/0x130 [ 744.159556][T14898] ? atime_needs_update+0x720/0x720 [ 744.164837][T14898] ? shmem_file_read_iter+0xac0/0xac0 [ 744.170432][T14898] ? security_file_permission+0xdc/0x100 [ 744.176128][T14898] ? splice_from_pipe+0x130/0x130 [ 744.181300][T14898] direct_splice_actor+0x118/0x180 [ 744.186487][T14898] splice_direct_to_actor+0x347/0xa30 [ 744.191928][T14898] ? folio_flags.constprop.0+0x150/0x150 [ 744.198094][T14898] ? vfs_splice_read+0x3b0/0x3b0 [ 744.203177][T14898] ? bpf_lsm_file_permission+0x9/0x10 [ 744.208596][T14898] ? security_file_permission+0x94/0x100 [ 744.214299][T14898] do_splice_direct+0x1af/0x280 [ 744.219219][T14898] ? splice_direct_to_actor+0xa30/0xa30 [ 744.224822][T14898] ? propagate_umount+0x1af0/0x1af0 [ 744.230080][T14898] ? bpf_lsm_file_permission+0x9/0x10 [ 744.235496][T14898] ? security_file_permission+0x94/0x100 [ 744.241197][T14898] do_sendfile+0xb88/0x1390 [ 744.245758][T14898] ? bit_wait_timeout+0x160/0x160 [ 744.250836][T14898] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 744.256193][T14898] __x64_sys_sendfile64+0x1d6/0x220 [ 744.261451][T14898] ? ksys_write+0x1a7/0x250 [ 744.266020][T14898] ? __ia32_sys_sendfile+0x220/0x220 [ 744.271450][T14898] ? syscall_enter_from_user_mode+0x26/0x80 [ 744.277410][T14898] do_syscall_64+0x38/0xb0 [ 744.281867][T14898] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 744.287802][T14898] RIP: 0033:0x7f64d1c7cae9 [ 744.292247][T14898] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 744.311896][T14898] RSP: 002b:00007f64d07fe0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 744.320352][T14898] RAX: ffffffffffffffda RBX: 00007f64d1d9c050 RCX: 00007f64d1c7cae9 [ 744.328366][T14898] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 744.336375][T14898] RBP: 00007f64d07fe120 R08: 0000000000000000 R09: 0000000000000000 [ 744.344382][T14898] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 744.352388][T14898] R13: 000000000000006e R14: 00007f64d1d9c050 R15: 00007f64d1ebfa48 [ 744.360409][T14898] [ 744.423445][T14900] CPU: 1 PID: 14900 Comm: syz-executor.2 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 744.433933][T14900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 744.444026][T14900] Call Trace: [ 744.447330][T14900] [ 744.450291][T14900] dump_stack_lvl+0x125/0x1b0 [ 744.455028][T14900] should_fail_ex+0x496/0x5b0 [ 744.459765][T14900] should_failslab+0x9/0x20 [ 744.464329][T14900] kmem_cache_alloc_node+0x389/0x3f0 [ 744.469687][T14900] ? __alloc_skb+0x287/0x330 [ 744.474336][T14900] __alloc_skb+0x287/0x330 [ 744.478802][T14900] ? __napi_build_skb+0x50/0x50 [ 744.483727][T14900] tcp_stream_alloc_skb+0x34/0x560 [ 744.488874][T14900] tcp_sendmsg_locked+0xf47/0x3420 [ 744.494020][T14900] ? scatterwalk_copychunks+0x22c/0x560 [ 744.499590][T14900] ? tcp_sendmsg_fastopen+0x720/0x720 [ 744.504974][T14900] ? skcipher_walk_done+0x458/0xd60 [ 744.510193][T14900] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 744.515703][T14900] tls_push_sg+0x24a/0x730 [ 744.520238][T14900] ? wait_on_pending_writer+0x4b0/0x4b0 [ 744.525835][T14900] ? crypto_skcipher_encrypt+0xc3/0x100 [ 744.531414][T14900] tls_tx_records+0x343/0x6e0 [ 744.536124][T14900] tls_push_record+0x2059/0x31b0 [ 744.541280][T14900] ? tls_tx_records+0x6e0/0x6e0 [ 744.546153][T14900] ? sk_psock_get+0x146/0x470 [ 744.550855][T14900] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 744.556081][T14900] ? find_held_lock+0x2d/0x110 [ 744.560880][T14900] bpf_exec_tx_verdict+0xdba/0x11d0 [ 744.566108][T14900] ? page_ext_get+0x182/0x310 [ 744.570823][T14900] ? tls_push_record+0x31b0/0x31b0 [ 744.576033][T14900] ? __sk_mem_schedule+0xa7/0xe0 [ 744.581008][T14900] ? sk_msg_alloc+0x6e8/0xaa0 [ 744.585721][T14900] tls_sw_sendmsg+0xd3e/0x2ba0 [ 744.590536][T14900] ? tx_work_handler+0x230/0x230 [ 744.595502][T14900] ? aa_sk_perm+0x2c1/0xae0 [ 744.600042][T14900] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 744.606056][T14900] ? __mark_inode_dirty+0x68e/0xd50 [ 744.611367][T14900] ? reacquire_held_locks+0x20b/0x4b0 [ 744.616765][T14900] ? __mark_inode_dirty+0x68e/0xd50 [ 744.622013][T14900] inet6_sendmsg+0x9d/0xe0 [ 744.626456][T14900] ? inet6_compat_ioctl+0x350/0x350 [ 744.631687][T14900] sock_sendmsg+0xd9/0x180 [ 744.636127][T14900] splice_to_socket+0xade/0x1010 [ 744.641197][T14900] ? splice_from_pipe+0x130/0x130 [ 744.646263][T14900] ? atime_needs_update+0x720/0x720 [ 744.651514][T14900] ? shmem_file_read_iter+0xac0/0xac0 [ 744.656909][T14900] ? security_file_permission+0xdc/0x100 [ 744.662579][T14900] ? splice_from_pipe+0x130/0x130 [ 744.667635][T14900] direct_splice_actor+0x118/0x180 [ 744.672782][T14900] splice_direct_to_actor+0x347/0xa30 [ 744.678192][T14900] ? folio_flags.constprop.0+0x150/0x150 [ 744.683864][T14900] ? vfs_splice_read+0x3b0/0x3b0 [ 744.688834][T14900] ? bpf_lsm_file_permission+0x9/0x10 [ 744.694223][T14900] ? security_file_permission+0x94/0x100 [ 744.699895][T14900] do_splice_direct+0x1af/0x280 [ 744.704778][T14900] ? splice_direct_to_actor+0xa30/0xa30 [ 744.710357][T14900] ? propagate_umount+0x1af0/0x1af0 [ 744.715586][T14900] ? bpf_lsm_file_permission+0x9/0x10 [ 744.720987][T14900] ? security_file_permission+0x94/0x100 [ 744.726675][T14900] do_sendfile+0xb88/0x1390 [ 744.731216][T14900] ? bit_wait_timeout+0x160/0x160 [ 744.736266][T14900] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 744.741593][T14900] __x64_sys_sendfile64+0x1d6/0x220 [ 744.746828][T14900] ? ksys_write+0x1a7/0x250 [ 744.751365][T14900] ? __ia32_sys_sendfile+0x220/0x220 [ 744.756688][T14900] ? syscall_enter_from_user_mode+0x26/0x80 [ 744.762618][T14900] do_syscall_64+0x38/0xb0 [ 744.767057][T14900] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 744.772971][T14900] RIP: 0033:0x7f2752e7cae9 [ 744.777398][T14900] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 744.797031][T14900] RSP: 002b:00007f2753c220c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 744.805472][T14900] RAX: ffffffffffffffda RBX: 00007f2752f9c050 RCX: 00007f2752e7cae9 [ 744.813456][T14900] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 744.821456][T14900] RBP: 00007f2753c22120 R08: 0000000000000000 R09: 0000000000000000 [ 744.829725][T14900] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 744.837721][T14900] R13: 000000000000006e R14: 00007f2752f9c050 R15: 00007f27530bfa48 [ 744.845728][T14900] 22:15:50 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) (async) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x10, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) (async, rerun: 32) sendfile(r5, r2, 0x0, 0x800100020013) (rerun: 32) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:50 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20028005, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:50 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDMKTONE(r5, 0x4b30, 0x3) syz_usb_connect(0x0, 0x0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) syz_open_dev$sndmidi(0x0, 0x2, 0x0) (async) dup(r0) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r2, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) ftruncate(r4, 0x208200) (async) sendfile(r3, r1, 0x0, 0x800100020013) (async) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) ioctl$KDMKTONE(r5, 0x4b30, 0x3) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) [ 745.154788][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 745.247325][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 745.265950][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:50 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = gettid() process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x10, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) (async) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) (async) dup(r0) (async) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) gettid() (async) process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x10, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) (async) syz_open_procfs(r3, &(0x7f0000000100)='coredump_filter\x00') (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) ftruncate(r6, 0x208200) (async) sendfile(r5, r2, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) 22:15:50 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 7) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:50 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDMKTONE(r5, 0x4b30, 0x3) syz_usb_connect(0x0, 0x0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) syz_open_dev$sndmidi(0x0, 0x2, 0x0) (async) dup(r0) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r2, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) ftruncate(r4, 0x208200) (async) sendfile(r3, r1, 0x0, 0x800100020013) (async) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) ioctl$KDMKTONE(r5, 0x4b30, 0x3) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) [ 745.681487][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 745.739499][T14927] FAULT_INJECTION: forcing a failure. [ 745.739499][T14927] name failslab, interval 1, probability 0, space 0, times 0 [ 745.761334][T14927] CPU: 0 PID: 14927 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 745.771805][T14927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 745.781862][T14927] Call Trace: [ 745.785139][T14927] [ 745.788065][T14927] dump_stack_lvl+0x125/0x1b0 [ 745.792755][T14927] should_fail_ex+0x496/0x5b0 [ 745.797443][T14927] should_failslab+0x9/0x20 [ 745.801956][T14927] kmem_cache_alloc_node+0x389/0x3f0 [ 745.807252][T14927] ? __alloc_skb+0x287/0x330 [ 745.811864][T14927] __alloc_skb+0x287/0x330 [ 745.816295][T14927] ? __napi_build_skb+0x50/0x50 [ 745.821159][T14927] tcp_stream_alloc_skb+0x34/0x560 [ 745.826276][T14927] tcp_sendmsg_locked+0xf47/0x3420 [ 745.831393][T14927] ? scatterwalk_copychunks+0x22c/0x560 [ 745.836957][T14927] ? tcp_sendmsg_fastopen+0x720/0x720 [ 745.842337][T14927] ? skcipher_walk_done+0x458/0xd60 [ 745.847542][T14927] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 745.852973][T14927] tls_push_sg+0x24a/0x730 [ 745.857440][T14927] ? wait_on_pending_writer+0x4b0/0x4b0 [ 745.863014][T14927] ? crypto_skcipher_encrypt+0xc3/0x100 [ 745.868593][T14927] tls_tx_records+0x343/0x6e0 [ 745.873279][T14927] tls_push_record+0x2059/0x31b0 [ 745.878225][T14927] ? tls_tx_records+0x6e0/0x6e0 [ 745.883069][T14927] ? sk_psock_get+0x146/0x470 [ 745.887743][T14927] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 745.892940][T14927] ? find_held_lock+0x2d/0x110 [ 745.897709][T14927] bpf_exec_tx_verdict+0xdba/0x11d0 [ 745.902913][T14927] ? page_ext_get+0x182/0x310 [ 745.907593][T14927] ? tls_push_record+0x31b0/0x31b0 [ 745.912838][T14927] ? __sk_mem_schedule+0xa7/0xe0 [ 745.918296][T14927] ? sk_msg_alloc+0x6e8/0xaa0 [ 745.922981][T14927] tls_sw_sendmsg+0xd3e/0x2ba0 [ 745.927763][T14927] ? tx_work_handler+0x230/0x230 [ 745.932703][T14927] ? aa_sk_perm+0x2c1/0xae0 [ 745.937205][T14927] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 745.943195][T14927] ? __mark_inode_dirty+0x68e/0xd50 [ 745.948401][T14927] ? reacquire_held_locks+0x20b/0x4b0 [ 745.953785][T14927] ? __mark_inode_dirty+0x68e/0xd50 [ 745.958984][T14927] inet6_sendmsg+0x9d/0xe0 [ 745.963401][T14927] ? inet6_compat_ioctl+0x350/0x350 [ 745.968605][T14927] sock_sendmsg+0xd9/0x180 [ 745.973020][T14927] splice_to_socket+0xade/0x1010 [ 745.978062][T14927] ? splice_from_pipe+0x130/0x130 [ 745.983093][T14927] ? atime_needs_update+0x720/0x720 [ 745.988302][T14927] ? shmem_file_read_iter+0xac0/0xac0 [ 745.993673][T14927] ? security_file_permission+0xdc/0x100 [ 745.999310][T14927] ? splice_from_pipe+0x130/0x130 [ 746.004336][T14927] direct_splice_actor+0x118/0x180 [ 746.009450][T14927] splice_direct_to_actor+0x347/0xa30 [ 746.014822][T14927] ? folio_flags.constprop.0+0x150/0x150 [ 746.020458][T14927] ? vfs_splice_read+0x3b0/0x3b0 [ 746.025396][T14927] ? bpf_lsm_file_permission+0x9/0x10 [ 746.030766][T14927] ? security_file_permission+0x94/0x100 [ 746.036412][T14927] do_splice_direct+0x1af/0x280 [ 746.041268][T14927] ? splice_direct_to_actor+0xa30/0xa30 [ 746.046820][T14927] ? propagate_umount+0x1af0/0x1af0 [ 746.052028][T14927] ? bpf_lsm_file_permission+0x9/0x10 [ 746.057399][T14927] ? security_file_permission+0x94/0x100 [ 746.063043][T14927] do_sendfile+0xb88/0x1390 [ 746.067565][T14927] ? bit_wait_timeout+0x160/0x160 [ 746.072602][T14927] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 746.077905][T14927] __x64_sys_sendfile64+0x1d6/0x220 [ 746.083109][T14927] ? ksys_write+0x1a7/0x250 [ 746.087621][T14927] ? __ia32_sys_sendfile+0x220/0x220 [ 746.092919][T14927] ? syscall_enter_from_user_mode+0x26/0x80 [ 746.098820][T14927] do_syscall_64+0x38/0xb0 [ 746.103235][T14927] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 746.109125][T14927] RIP: 0033:0x7f376ce7cae9 [ 746.113537][T14927] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 746.133147][T14927] RSP: 002b:00007f376dc9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 746.141573][T14927] RAX: ffffffffffffffda RBX: 00007f376cf9c050 RCX: 00007f376ce7cae9 [ 746.149560][T14927] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 746.157533][T14927] RBP: 00007f376dc9c120 R08: 0000000000000000 R09: 0000000000000000 [ 746.165508][T14927] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 746.173472][T14927] R13: 000000000000006e R14: 00007f376cf9c050 R15: 00007f376d0bfa48 [ 746.181454][T14927] [ 746.216882][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 746.257444][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:51 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) r6 = accept4(r5, 0x0, &(0x7f0000000100), 0x800) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x128}}, 0x0) getsockname$packet(r8, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r8) ftruncate(r7, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xb, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_getrule={0x1c, 0x22, 0x20, 0x70bd26, 0x25dfdbfb, {0x2, 0x20, 0x0, 0x9, 0x9, 0x0, 0x0, 0x2, 0x10007}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24008005) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:51 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r2 = fcntl$getown(r1, 0x9) sched_setaffinity(r2, 0x8, &(0x7f0000000000)=0x810) dup(r1) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) setsockopt$inet6_int(r0, 0x29, 0x34, &(0x7f0000000180)=0x7fff, 0x4) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fgetxattr(r8, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) connect$unix(r8, &(0x7f00000001c0)=@file={0x1, './bus\x00'}, 0x6e) r9 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x2102, 0x0) r10 = dup3(r9, r7, 0x0) write$rfkill(r10, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) ioctl$SNDCTL_DSP_GETOSPACE(r10, 0x8010500c, &(0x7f0000000100)) 22:15:51 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 746.761627][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 746.811809][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 746.824478][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 747.303866][ T1233] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.310281][ T1233] ieee802154 phy1 wpan1: encryption failed: -22 22:15:52 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 7) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 747.543629][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:52 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r2 = fcntl$getown(r1, 0x9) sched_setaffinity(r2, 0x8, &(0x7f0000000000)=0x810) (async) dup(r1) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) setsockopt$inet6_int(r0, 0x29, 0x34, &(0x7f0000000180)=0x7fff, 0x4) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fgetxattr(r8, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) connect$unix(r8, &(0x7f00000001c0)=@file={0x1, './bus\x00'}, 0x6e) (async) r9 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x2102, 0x0) r10 = dup3(r9, r7, 0x0) write$rfkill(r10, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) (async) ioctl$SNDCTL_DSP_GETOSPACE(r10, 0x8010500c, &(0x7f0000000100)) 22:15:52 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) (async) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) r6 = accept4(r5, 0x0, &(0x7f0000000100), 0x800) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x128}}, 0x0) getsockname$packet(r8, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r8) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r8) ftruncate(r7, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (async) sendfile(r4, r2, 0x0, 0x800100020013) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xb, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_getrule={0x1c, 0x22, 0x20, 0x70bd26, 0x25dfdbfb, {0x2, 0x20, 0x0, 0x9, 0x9, 0x0, 0x0, 0x2, 0x10007}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24008005) (async) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xb, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_getrule={0x1c, 0x22, 0x20, 0x70bd26, 0x25dfdbfb, {0x2, 0x20, 0x0, 0x9, 0x9, 0x0, 0x0, 0x2, 0x10007}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24008005) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:53 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r2 = fcntl$getown(r1, 0x9) sched_setaffinity(r2, 0x8, &(0x7f0000000000)=0x810) dup(r1) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) setsockopt$inet6_int(r0, 0x29, 0x34, &(0x7f0000000180)=0x7fff, 0x4) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) (async) sendfile(r5, r3, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) fgetxattr(r8, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) (async) connect$unix(r8, &(0x7f00000001c0)=@file={0x1, './bus\x00'}, 0x6e) (async) r9 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x2102, 0x0) r10 = dup3(r9, r7, 0x0) write$rfkill(r10, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) (async) ioctl$SNDCTL_DSP_GETOSPACE(r10, 0x8010500c, &(0x7f0000000100)) 22:15:53 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20028005, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) (async) dup(r0) (async) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20028005, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) ftruncate(r5, 0x208200) (async) sendfile(r4, r2, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) 22:15:53 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) r6 = accept4(r5, 0x0, &(0x7f0000000100), 0x800) (async) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x128}}, 0x0) (async) getsockname$packet(r8, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r8) (async) ftruncate(r7, 0x208200) (async) sendfile(r4, r2, 0x0, 0x800100020013) (async) sendmsg$nl_route(r6, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xb, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv4_getrule={0x1c, 0x22, 0x20, 0x70bd26, 0x25dfdbfb, {0x2, 0x20, 0x0, 0x9, 0x9, 0x0, 0x0, 0x2, 0x10007}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24008005) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:53 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100), 0x2200, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x2102, 0x0) r4 = dup3(r3, r2, 0x0) write$rfkill(r4, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000180)={0x15, 0x2, 0x13}) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r5 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000000c0), 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r8 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r8, 0x208200) sendfile(r7, r5, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:54 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 8) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:54 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r1) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:54 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20028005, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) (async) dup(r0) (async) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r4, 0x0, 0x0, 0x20028005, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) ftruncate(r5, 0x208200) (async) sendfile(r4, r2, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) [ 749.429179][T14994] FAULT_INJECTION: forcing a failure. [ 749.429179][T14994] name failslab, interval 1, probability 0, space 0, times 0 [ 749.509795][T14994] CPU: 1 PID: 14994 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 749.520280][T14994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 749.530344][T14994] Call Trace: [ 749.533617][T14994] [ 749.536542][T14994] dump_stack_lvl+0x125/0x1b0 [ 749.541229][T14994] should_fail_ex+0x496/0x5b0 [ 749.545927][T14994] should_failslab+0x9/0x20 [ 749.550435][T14994] __kmem_cache_alloc_node+0x2fd/0x350 [ 749.555907][T14994] ? tls_get_rec+0xfa/0x650 [ 749.560445][T14994] ? tls_get_rec+0xfa/0x650 [ 749.564978][T14994] __kmalloc+0x4c/0x100 [ 749.569143][T14994] tls_get_rec+0xfa/0x650 [ 749.573494][T14994] tls_sw_sendmsg+0xee1/0x2ba0 [ 749.578280][T14994] ? tx_work_handler+0x230/0x230 [ 749.583221][T14994] ? aa_sk_perm+0x2c1/0xae0 [ 749.587732][T14994] ? lockdep_hardirqs_on+0x7d/0x100 [ 749.592935][T14994] ? asm_sysvec_reschedule_ipi+0x1a/0x20 [ 749.598571][T14994] inet6_sendmsg+0x9d/0xe0 [ 749.602988][T14994] ? inet6_compat_ioctl+0x350/0x350 [ 749.608192][T14994] sock_sendmsg+0xd9/0x180 [ 749.612632][T14994] splice_to_socket+0xade/0x1010 [ 749.617775][T14994] ? splice_from_pipe+0x130/0x130 [ 749.622817][T14994] ? atime_needs_update+0x720/0x720 [ 749.628034][T14994] ? shmem_file_read_iter+0xac0/0xac0 [ 749.633437][T14994] ? security_file_permission+0xdc/0x100 [ 749.639174][T14994] ? splice_from_pipe+0x130/0x130 [ 749.644224][T14994] direct_splice_actor+0x118/0x180 [ 749.649356][T14994] splice_direct_to_actor+0x347/0xa30 [ 749.654735][T14994] ? folio_flags.constprop.0+0x150/0x150 [ 749.660374][T14994] ? vfs_splice_read+0x3b0/0x3b0 [ 749.665310][T14994] ? bpf_lsm_file_permission+0x9/0x10 [ 749.670676][T14994] ? security_file_permission+0x94/0x100 [ 749.676317][T14994] do_splice_direct+0x1af/0x280 [ 749.681167][T14994] ? splice_direct_to_actor+0xa30/0xa30 [ 749.686721][T14994] ? propagate_umount+0x1af0/0x1af0 [ 749.692008][T14994] ? bpf_lsm_file_permission+0x9/0x10 [ 749.697481][T14994] ? security_file_permission+0x94/0x100 [ 749.703129][T14994] do_sendfile+0xb88/0x1390 [ 749.707651][T14994] ? bit_wait_timeout+0x160/0x160 [ 749.712771][T14994] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 749.718251][T14994] __x64_sys_sendfile64+0x1d6/0x220 [ 749.723463][T14994] ? ksys_write+0x1a7/0x250 [ 749.727975][T14994] ? __ia32_sys_sendfile+0x220/0x220 [ 749.733265][T14994] ? syscall_enter_from_user_mode+0x26/0x80 [ 749.739595][T14994] do_syscall_64+0x38/0xb0 [ 749.744006][T14994] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 749.749895][T14994] RIP: 0033:0x7f376ce7cae9 [ 749.754319][T14994] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 749.774197][T14994] RSP: 002b:00007f376dc9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 749.782704][T14994] RAX: ffffffffffffffda RBX: 00007f376cf9c050 RCX: 00007f376ce7cae9 [ 749.790674][T14994] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 749.798641][T14994] RBP: 00007f376dc9c120 R08: 0000000000000000 R09: 0000000000000000 22:15:54 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 749.806606][T14994] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 749.814569][T14994] R13: 000000000000006e R14: 00007f376cf9c050 R15: 00007f376d0bfa48 [ 749.822565][T14994] 22:15:55 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100), 0x2200, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x2102, 0x0) r4 = dup3(r3, r2, 0x0) write$rfkill(r4, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000180)={0x15, 0x2, 0x13}) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async) r5 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000000c0), 0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) (async) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r8 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r8, 0x208200) sendfile(r7, r5, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:55 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 8) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:15:55 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) memfd_secret(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x2102, 0x0) r6 = dup3(r5, r4, 0x0) write$rfkill(r6, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) read$nci(r6, &(0x7f0000000100)=""/25, 0x19) listen(r3, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) write$rfkill(0xffffffffffffffff, &(0x7f0000000180)={0xe01, 0x1, 0x3, 0x1, 0x1}, 0x8) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r8 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r8, 0x208200) sendfile(r7, r2, 0x0, 0x800100020013) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x4db}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x4000004) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x800) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000050}, 0x54) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:55 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async, rerun: 64) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) (async, rerun: 64) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) (async, rerun: 64) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100), 0x2200, 0x0) (async, rerun: 64) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async, rerun: 32) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x2102, 0x0) (rerun: 32) r4 = dup3(r3, r2, 0x0) write$rfkill(r4, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) (async) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000180)={0x15, 0x2, 0x13}) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r5 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000001c0)={'wg1\x00'}) (async) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r8 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r8, 0x208200) (async) sendfile(r7, r5, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 750.210741][ C0] net_ratelimit: 9 callbacks suppressed [ 750.210754][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 750.228690][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 750.241554][T15015] FAULT_INJECTION: forcing a failure. [ 750.241554][T15015] name failslab, interval 1, probability 0, space 0, times 0 [ 750.334306][T15015] CPU: 1 PID: 15015 Comm: syz-executor.2 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 750.344778][T15015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 750.354829][T15015] Call Trace: [ 750.358112][T15015] [ 750.361033][T15015] dump_stack_lvl+0x125/0x1b0 [ 750.365708][T15015] should_fail_ex+0x496/0x5b0 [ 750.370387][T15015] should_failslab+0x9/0x20 [ 750.374890][T15015] __kmem_cache_alloc_node+0x2fd/0x350 [ 750.380345][T15015] ? tls_get_rec+0xfa/0x650 [ 750.384848][T15015] ? tls_get_rec+0xfa/0x650 [ 750.389349][T15015] __kmalloc+0x4c/0x100 [ 750.393528][T15015] tls_get_rec+0xfa/0x650 [ 750.397899][T15015] tls_sw_sendmsg+0xee1/0x2ba0 [ 750.402682][T15015] ? tx_work_handler+0x230/0x230 [ 750.407820][T15015] ? aa_sk_perm+0x2c1/0xae0 [ 750.412322][T15015] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 750.418309][T15015] ? __mark_inode_dirty+0x68e/0xd50 [ 750.423506][T15015] ? reacquire_held_locks+0x20b/0x4b0 [ 750.428877][T15015] ? __mark_inode_dirty+0x68e/0xd50 [ 750.434075][T15015] inet6_sendmsg+0x9d/0xe0 [ 750.438490][T15015] ? inet6_compat_ioctl+0x350/0x350 [ 750.443692][T15015] sock_sendmsg+0xd9/0x180 [ 750.448114][T15015] splice_to_socket+0xade/0x1010 [ 750.453065][T15015] ? splice_from_pipe+0x130/0x130 [ 750.458189][T15015] ? atime_needs_update+0x720/0x720 [ 750.463402][T15015] ? shmem_file_read_iter+0xac0/0xac0 [ 750.468859][T15015] ? security_file_permission+0xdc/0x100 [ 750.474512][T15015] ? splice_from_pipe+0x130/0x130 [ 750.479555][T15015] direct_splice_actor+0x118/0x180 [ 750.484772][T15015] splice_direct_to_actor+0x347/0xa30 [ 750.490176][T15015] ? folio_flags.constprop.0+0x150/0x150 [ 750.495817][T15015] ? vfs_splice_read+0x3b0/0x3b0 [ 750.500756][T15015] ? bpf_lsm_file_permission+0x9/0x10 [ 750.506119][T15015] ? security_file_permission+0x94/0x100 [ 750.511933][T15015] do_splice_direct+0x1af/0x280 [ 750.516785][T15015] ? splice_direct_to_actor+0xa30/0xa30 [ 750.522335][T15015] ? propagate_umount+0x1af0/0x1af0 [ 750.527536][T15015] ? bpf_lsm_file_permission+0x9/0x10 [ 750.532903][T15015] ? security_file_permission+0x94/0x100 [ 750.538540][T15015] do_sendfile+0xb88/0x1390 [ 750.543062][T15015] ? bit_wait_timeout+0x160/0x160 [ 750.548122][T15015] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 750.553435][T15015] __x64_sys_sendfile64+0x1d6/0x220 [ 750.558654][T15015] ? ksys_write+0x1a7/0x250 [ 750.563170][T15015] ? __ia32_sys_sendfile+0x220/0x220 [ 750.568466][T15015] ? syscall_enter_from_user_mode+0x26/0x80 [ 750.574366][T15015] do_syscall_64+0x38/0xb0 [ 750.578779][T15015] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 750.584678][T15015] RIP: 0033:0x7f2752e7cae9 [ 750.589084][T15015] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 750.608713][T15015] RSP: 002b:00007f2753c220c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 750.617210][T15015] RAX: ffffffffffffffda RBX: 00007f2752f9c050 RCX: 00007f2752e7cae9 [ 750.625178][T15015] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 22:15:55 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) bind$unix(r0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e23}, 0x6e) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:55 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r1) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) (async) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 750.633139][T15015] RBP: 00007f2753c22120 R08: 0000000000000000 R09: 0000000000000000 [ 750.641101][T15015] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000001 [ 750.649069][T15015] R13: 000000000000006e R14: 00007f2752f9c050 R15: 00007f27530bfa48 [ 750.657058][T15015] [ 750.807377][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 750.853829][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:56 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async, rerun: 64) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (rerun: 64) r1 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r1) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) (async, rerun: 64) sendfile(r4, r2, 0x0, 0x800100020013) (async, rerun: 64) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:56 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, 0x0, 0x1, 0x4002) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0xff, @private0, 0x6}, 0x1c) [ 751.429470][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:57 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 9) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:57 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) memfd_secret(0x0) (async, rerun: 64) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) (rerun: 64) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) (async) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async, rerun: 32) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (rerun: 32) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x2102, 0x0) r6 = dup3(r5, r4, 0x0) write$rfkill(r6, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) (async) read$nci(r6, &(0x7f0000000100)=""/25, 0x19) (async) listen(r3, 0x0) (async) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) write$rfkill(0xffffffffffffffff, &(0x7f0000000180)={0xe01, 0x1, 0x3, 0x1, 0x1}, 0x8) (async) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r8 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r8, 0x208200) (async, rerun: 64) sendfile(r7, r2, 0x0, 0x800100020013) (async, rerun: 64) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x4db}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x4000004) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x800) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000050}, 0x54) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:57 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) bind$unix(r0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e23}, 0x6e) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) bind$unix(r0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e23}, 0x6e) (async) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) (async) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) (async) dup(r1) (async) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) ftruncate(r6, 0x208200) (async) sendfile(r5, r3, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) 22:15:57 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, 0x0, 0x1, 0x4002) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r1 = dup(r0) (async, rerun: 64) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 64) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 32) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (rerun: 32) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) (async, rerun: 64) sendfile(r4, r2, 0x0, 0x800100020013) (async, rerun: 64) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0xff, @private0, 0x6}, 0x1c) 22:15:57 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) dup2(0xffffffffffffffff, 0xffffffffffffffff) (async) listen(r3, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) (async) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:57 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 9) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:15:57 executing program 3: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) dup2(0xffffffffffffffff, 0xffffffffffffffff) (async) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 752.846300][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 752.895826][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 752.934673][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:58 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x6, @local, 0x2}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) fanotify_mark(r0, 0x400, 0x18, r2, &(0x7f0000000180)='./bus\x00') r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 753.048627][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:58 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) bind$unix(r0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e23}, 0x6e) (async) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) (async) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) (async) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:58 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ptrace$ARCH_ENABLE_TAGGED_ADDR(0x1e, 0x0, 0x1, 0x4002) (async) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) (async, rerun: 32) sendfile(r4, r2, 0x0, 0x800100020013) (rerun: 32) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0xff, @private0, 0x6}, 0x1c) [ 753.217592][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:15:58 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async, rerun: 32) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) (async, rerun: 32) memfd_secret(0x0) (async) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) (async) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) (async) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async, rerun: 32) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (rerun: 32) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300), 0x2102, 0x0) r6 = dup3(r5, r4, 0x0) write$rfkill(r6, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) read$nci(r6, &(0x7f0000000100)=""/25, 0x19) (async, rerun: 64) listen(r3, 0x0) (rerun: 64) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) write$rfkill(0xffffffffffffffff, &(0x7f0000000180)={0xe01, 0x1, 0x3, 0x1, 0x1}, 0x8) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r8 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r8, 0x208200) (async, rerun: 64) sendfile(r7, r2, 0x0, 0x800100020013) (async, rerun: 64) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x2, 0x4db}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x4000004) (async, rerun: 32) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x800) (rerun: 32) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000050}, 0x54) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:15:58 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) listen(r5, 0x23e0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:00 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 10) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:00 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r3 = accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c, 0x80000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x5) listen(r3, 0x200) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$rfkill(r5, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r6, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x128}}, 0x0) getsockname$packet(r8, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendto$inet6(r8, &(0x7f0000000180)="b66e3e10be4f7c09eabef5ffd5a84ba190e13ad61cdfca0f34494c0e1e0ef58fe13bebbddae66cd2402b8c0ad16acf14ac550c191d88896de669d108456ba06ad287d5060743db4852fca26daf3003d8e7587d87371a5045374c53a322c1012b02a468d458e4920066b970645b47c916acc72d34cfaf9c91bace7c5d977a612e72513ae718691f79adc5724c3b0023785d453d5bc6f9d6b948d78a182bf29e50bfe72ace080e0e153ebaa9f1674e2a1a98e69139b6b9d9c8cffe97b5e7915993e0f2d54f8474c94687cfcd3aa002ce1c", 0xd0, 0x40081, 0x0, 0x0) 22:16:00 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) (async) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) (async) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) listen(r5, 0x23e0) (async) listen(r5, 0x23e0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:00 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 10) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) 22:16:00 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x6, @local, 0x2}, 0x1c) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) fanotify_mark(r0, 0x400, 0x18, r2, &(0x7f0000000180)='./bus\x00') r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) (async) sendfile(r5, r3, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 755.249703][ C1] net_ratelimit: 2 callbacks suppressed [ 755.249720][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 755.271846][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 755.283781][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:16:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) (async) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r3 = accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c, 0x80000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) (async) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) (async) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) (async) socket$caif_seqpacket(0x25, 0x5, 0x5) listen(r3, 0x200) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$rfkill(r5, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) (async) ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r7, 0x208200) (async) sendfile(r6, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x128}}, 0x0) getsockname$packet(r8, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendto$inet6(r8, &(0x7f0000000180)="b66e3e10be4f7c09eabef5ffd5a84ba190e13ad61cdfca0f34494c0e1e0ef58fe13bebbddae66cd2402b8c0ad16acf14ac550c191d88896de669d108456ba06ad287d5060743db4852fca26daf3003d8e7587d87371a5045374c53a322c1012b02a468d458e4920066b970645b47c916acc72d34cfaf9c91bace7c5d977a612e72513ae718691f79adc5724c3b0023785d453d5bc6f9d6b948d78a182bf29e50bfe72ace080e0e153ebaa9f1674e2a1a98e69139b6b9d9c8cffe97b5e7915993e0f2d54f8474c94687cfcd3aa002ce1c", 0xd0, 0x40081, 0x0, 0x0) [ 755.337986][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:16:00 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) (async) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) listen(r5, 0x23e0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (async) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 755.447340][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:16:00 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x6, @local, 0x2}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) fanotify_mark(r0, 0x400, 0x18, r2, &(0x7f0000000180)='./bus\x00') r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) (async) dup(r1) (async) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) (async) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x6, @local, 0x2}, 0x1c) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) fanotify_mark(r0, 0x400, 0x18, r2, &(0x7f0000000180)='./bus\x00') (async) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) ftruncate(r6, 0x208200) (async) sendfile(r5, r3, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) 22:16:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) r3 = accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000100)=0x1c, 0x80000) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) (async) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_CT_DIRECTION={0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) (async) socket$caif_seqpacket(0x25, 0x5, 0x5) listen(r3, 0x200) (async) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$rfkill(r5, &(0x7f0000000000)={0x0, 0x0, 0x3, 0x8}, 0x8) (async) ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r7, 0x208200) (async) sendfile(r6, r1, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) r8 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x128}}, 0x0) getsockname$packet(r8, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendto$inet6(r8, &(0x7f0000000180)="b66e3e10be4f7c09eabef5ffd5a84ba190e13ad61cdfca0f34494c0e1e0ef58fe13bebbddae66cd2402b8c0ad16acf14ac550c191d88896de669d108456ba06ad287d5060743db4852fca26daf3003d8e7587d87371a5045374c53a322c1012b02a468d458e4920066b970645b47c916acc72d34cfaf9c91bace7c5d977a612e72513ae718691f79adc5724c3b0023785d453d5bc6f9d6b948d78a182bf29e50bfe72ace080e0e153ebaa9f1674e2a1a98e69139b6b9d9c8cffe97b5e7915993e0f2d54f8474c94687cfcd3aa002ce1c", 0xd0, 0x40081, 0x0, 0x0) [ 755.521396][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 755.586286][T15117] FAULT_INJECTION: forcing a failure. [ 755.586286][T15117] name failslab, interval 1, probability 0, space 0, times 0 [ 755.792882][T15117] CPU: 0 PID: 15117 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 755.803350][T15117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 755.813401][T15117] Call Trace: [ 755.816672][T15117] [ 755.819604][T15117] dump_stack_lvl+0x125/0x1b0 [ 755.824335][T15117] should_fail_ex+0x496/0x5b0 [ 755.829038][T15117] should_failslab+0x9/0x20 [ 755.833575][T15117] __kmem_cache_alloc_node+0x6b/0x350 [ 755.838957][T15117] ? skcipher_walk_next+0xf2d/0x1610 [ 755.844257][T15117] ? __crypto_xor+0x452/0x5f0 [ 755.848955][T15117] ? skcipher_walk_next+0xf2d/0x1610 [ 755.854274][T15117] __kmalloc+0x4c/0x100 [ 755.858446][T15117] skcipher_walk_next+0xf2d/0x1610 [ 755.863565][T15117] skcipher_walk_done+0x451/0xd60 [ 755.868678][T15117] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 755.874066][T15117] ctr_crypt+0x12e/0x280 [ 755.878306][T15117] ? xts_encrypt+0x20/0x20 [ 755.882721][T15117] ? shash_async_digest+0xb0/0xb0 [ 755.887749][T15117] ? crypto_rfc4309_encrypt+0x80/0x80 [ 755.893127][T15117] crypto_skcipher_encrypt+0xbc/0x100 [ 755.898500][T15117] crypto_skcipher_encrypt+0xbc/0x100 [ 755.903872][T15117] crypto_ccm_encrypt+0x37d/0x4c0 [ 755.908912][T15117] crypto_aead_encrypt+0xbc/0x100 [ 755.913945][T15117] tls_push_record+0x1bf3/0x31b0 [ 755.918907][T15117] ? tls_tx_records+0x6e0/0x6e0 [ 755.923844][T15117] ? sk_psock_get+0x146/0x470 [ 755.928519][T15117] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 755.933722][T15117] ? find_held_lock+0x2d/0x110 [ 755.938496][T15117] bpf_exec_tx_verdict+0xdba/0x11d0 [ 755.943698][T15117] ? page_ext_get+0x182/0x310 [ 755.948375][T15117] ? tls_push_record+0x31b0/0x31b0 [ 755.953532][T15117] ? sk_page_frag_refill+0x6c/0x300 [ 755.958735][T15117] ? __sk_mem_schedule+0xa7/0xe0 [ 755.963671][T15117] ? sk_msg_alloc+0x6e8/0xaa0 [ 755.968363][T15117] tls_sw_sendmsg+0xd3e/0x2ba0 [ 755.973753][T15117] ? tx_work_handler+0x230/0x230 [ 755.978700][T15117] ? aa_sk_perm+0x2c1/0xae0 [ 755.983201][T15117] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 755.989185][T15117] ? __mark_inode_dirty+0x68e/0xd50 [ 755.995509][T15117] ? reacquire_held_locks+0x20b/0x4b0 [ 756.000876][T15117] ? __mark_inode_dirty+0x68e/0xd50 [ 756.006076][T15117] inet6_sendmsg+0x9d/0xe0 [ 756.010490][T15117] ? inet6_compat_ioctl+0x350/0x350 [ 756.015688][T15117] sock_sendmsg+0xd9/0x180 [ 756.020188][T15117] splice_to_socket+0xade/0x1010 [ 756.025133][T15117] ? splice_from_pipe+0x130/0x130 [ 756.030163][T15117] ? atime_needs_update+0x720/0x720 [ 756.035374][T15117] ? shmem_file_read_iter+0xac0/0xac0 [ 756.040744][T15117] ? security_file_permission+0xdc/0x100 [ 756.046392][T15117] ? splice_from_pipe+0x130/0x130 [ 756.051425][T15117] direct_splice_actor+0x118/0x180 [ 756.056543][T15117] splice_direct_to_actor+0x347/0xa30 [ 756.061921][T15117] ? folio_flags.constprop.0+0x150/0x150 [ 756.067564][T15117] ? vfs_splice_read+0x3b0/0x3b0 [ 756.072515][T15117] ? bpf_lsm_file_permission+0x9/0x10 [ 756.077902][T15117] ? security_file_permission+0x94/0x100 [ 756.083546][T15117] do_splice_direct+0x1af/0x280 [ 756.088398][T15117] ? splice_direct_to_actor+0xa30/0xa30 [ 756.093945][T15117] ? propagate_umount+0x1af0/0x1af0 [ 756.099145][T15117] ? bpf_lsm_file_permission+0x9/0x10 [ 756.104516][T15117] ? security_file_permission+0x94/0x100 [ 756.110158][T15117] do_sendfile+0xb88/0x1390 [ 756.114674][T15117] ? bit_wait_timeout+0x160/0x160 [ 756.119700][T15117] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 756.125000][T15117] __x64_sys_sendfile64+0x1d6/0x220 [ 756.130206][T15117] ? ksys_write+0x1a7/0x250 [ 756.134712][T15117] ? __ia32_sys_sendfile+0x220/0x220 [ 756.140007][T15117] ? syscall_enter_from_user_mode+0x26/0x80 [ 756.145906][T15117] do_syscall_64+0x38/0xb0 [ 756.150321][T15117] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 756.156217][T15117] RIP: 0033:0x7f376ce7cae9 [ 756.160626][T15117] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 756.180252][T15117] RSP: 002b:00007f376dc9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 22:16:01 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) write$UHID_INPUT(r0, &(0x7f00000003c0)={0x8, {"961874fb62d7cd5d4984558cb25726dd2f686ec5d4f1704405122f1fc4eff0667c49a08d8d2d516ed708b5a7045feab074a95525014d46c4a90fbc16f8dd58b14cb0eef3d0f781d386081ff86eecd3974fb83712f5ffa9536f2c98e80f54fac3c917f10a4585b042b457c7a1be111aefd33641089189ecc7a028fed021984034126e38e751295ba0dd028617c7b9cea23b579299a006344cd25cbd7e5caaaddffb6ad417c3c1c219faf772ba1f8586f03eb42165b49703553b39e7f55a2f28aca438bf6ef9b523d5c3769db03f85afafaf20ffe405bc964df1b9a763f4c6beb4593adcd815a01be285c2112f8ad05d2d9025c9b8ed7c4676d4c57f3cd3d3e6439398c2aadb5e8b6256ee2ff80f5d8f3893fc2f8d4e83a60406e28077012efba89e48cf974db845ca00ff26bea13cc3ab87ffd39f11c03ed753de60c7f714cf49f2426a951efd93f69bff17aa2a1b067f0982dcd3709db407af99ccb63be0094da15d97f30787f371d8663b79c225ede83d600d525ee46adf6e6e2ac457eea3983839669319b706c93591252c24ff2057cddb53015e93cff2892aa12d18e034185b2440f964b87ac6d7c0d072f999e7344f1346e194f0de6e95b87bed93d30bf55aed8b45f640d1f0071898edaaeab2a2be6eac0dac8532320893c5646a5d6f567b15495f5976b6c6acc0328af966eb642c5a363cc455e441cb74e82bdf8bccda988ee811f369d13ae2cfc9e007db3bda8076ba18026df6595d718e5639d4707dcfa2d8757b61f1a2c3c3ab6ce13152a5be8b662e44e2f1c57583901e2308aa9cd592a2f9e57b1ee09fdf9403e7c59c9e3d1b18e3b86377b76b4c47c10bde139d987d7e3faa3efafd8c05257e0e61be39b50f236be578cbf8840886ff69b28c6931deee9a7faf5241e724152e24429e17428e5f68e15f7cafd9f1a81d0a7db06c07bbce23f9e06655fba9231019eb7784d0923736f80d0beaf36fa8e0c7f35cb04c401d8c67453393c65d593affadc2df2c9bf51dcfe208721905e9ba86ea1ec510f655fd3608260f348eab8c1d39ffaaae0eafea658dc38822693e8e34a645e6ce0171fafd876edf383d2f07b1657c0a8fbaf39ca8f7be0d74c9c523102f88df1340e5b3cd2543b9d0fa21cddce8841f9dce86dd3211afe35c6a279f339fe5abe09a637bcf60c5768786b31bee81353ac19f4a90762cf1f2a61e1c68d6cd08303600c5f44143c5cda59a44561f9b17a699c70bcdc2514301e00c7c27ac0a095c8184a770242a42cbf8abc7273c2c5e1369047e005abe87a52048ec0d43f38c915aad237e66745518aef09bd23911fdb9efe48f3fc1ade816efc7605ef1223819e168863fbdec7fe4502fe96a06b4db9a1059937c70d224a101f021b128a245fb19932e0fd5d5ac3d043e320eb9a742eba063f8b49106fbb03ad5bcc36c52515bcfee0713a2e0539a49f3db37271cda94fa15e306ebdcf50497b42bc2dbbc5bd6f81b00eadd7ae8c5250db7700dc3d2464dc04d9139ff574b4c955f8c2b4b3eff35e72edf54e8d85ba38ef520051f04120516d728d1b4a190ea6fb292a6ba5ccec9a9b03efa4767d3c26fff244311a889a6f018c861389d223f33f17d2b8f18e648713d862eb4f306c58c795d58feafc7e7e8b3ec5315f0b74f89c9eb30e6c834a50cfe647b799e2785b54bd3d3e091c9ac7390dce1dd2cc064f6b1a7b14cae95376d233a7ebcab741b15466fc0af5bee2805d46cb789e503edd62f521d921e0d79fff3122cc2140cc5171f45f3c7ba878a78fc106e5184852eac5c3d8b6a1449a76f87f194f75cf65a5ee5d5afe4d622ee0625ff21aeca470af1d4a32b84cc26d517a14a4b1e6fbb61f0ee2a6f9e9b8871ee38cfcde5ed01cb0ec73d5b2c88e33da3bd849a5f0e8cdaf8217cc52bf6ed0ee4d1936d1771fbc4e21c29c74b05d3137610d4b04093dacd197763f823c5ec89bd465936b854db9d88920f53cbf1bcc98ba4e6eda5f26d1d6101ce66afafb6b5cf4f6f97dd975071ec2bacfd3eaa8f624b64834c188b783e02a4b76d65218ad3f09d74906d6c4546a11d21a1dc11c8c97268d220a7abd15ba94cd142c8f3475c423ae68bc1bd8c80983cf279c90bdd73cf76f897f954ddaeb4fe6b7e7ba68811f7ff4ed1b3683554b12463397f581434aef76284c3693275ca7f954e8823032e37af489f7c0e4bbebbbcd6f8e7fdb88b7445e2eba0921a76f35cda58071fdd806894111d6fbf71ac82a116ccb499b41ca0fd0da47922f140fe1d81e59d17294635574f8a9510496296bb8ecf1786c5db15f87473c0b2baefa0194446a1df00e8f67cfbb1a5442a8ef9dc532054f9be0789a724d31e7e7ae854f8a0d326123f7c171ddde545f03f037ced2d19a5afe49de3afa35770383ade660d31cc0250afa539743537eda976e8f0944b72ca34ea34832f97bbf8412eb445c561334a65b7b9e23aca0bbecaea054d2778605bae3bb999c8699a7fc88318f9f695f12891f3c526bbc90e87b1a466789f2e5247b04c940f5b7bc770dbeeea9f85f844ca490588c58ad940b184ce28277130e1fd1e5a7152712e054bf02a60042a7d8554d626be5fe1fc6cd1a47ff1a5457a6c761498dc747bc0d4327c8488ccc895de873c242d18b06b5e29ff509d9c3ba9ebf9e7bf99ce27eb47e68c6aa7486c6a73a63a75cc01151a233e07bcacc34345c912c8b5178a41c8192060a51b7d234bf1bbdc6bac40597409c0204a89b09254cd5c094fe23a9cb73df4d2ca3724f9b2581092bdc96f761cbbc96bfd1cfb90d47cd2d56426b60e2475cac7779060538c6f37b6bda77bdc655010d3deb64755192d24062f435dc8286ffd2ce84b071b8d271011640b0908604731cf397044a6f4d49bb8f33e29a908e29affefa70b2f0d9474d2833d3183ece833b5218f08c126d455931378f098aa80eb82df7775f8b4f8d5457a9dac38fdefc3d771c29df7a347913149f6345878f6c0ae5234f011c3f613ff268fdbc24c733d67d036ad2f0114369b71d2257b352fc85c751a1c328a320efc15f64817c76855324a26641f6552715ec5ea12e301bab6597eaf099d9b4ce8ef491dab9c5e37d9910d28bc93f0008b70f90baa4dfeee2bb16149a63177f1e48550843a89264d4e3d3461f2b3c8c9dfd56ed2c2e4eadd6d845a9d363fd6765cd2bd5aa2b2bfcab9f555706cb374e168f6be474f9fb084ce8bbc33afe7283f3f638347613bae6d5f3d2f6538343433d6f5af47baac60d0806cad9f7d7672f6244b5e2cb35fe0f58b10e7e03b57a2d7c85e06066cc93fe4296269675569f4713a0d4cf5b2baa3694bd6882c9eed590fa710fe136515d27cb746f06bb932e9ccd884f76fb2fe67ffa86515cad41e630ba65f9335ea568abc4f2b5270bba573cc5e3c24375cfebbe6b396849c8c4d148850696e6868771c12597f934f50e1a5b928971d25cb0f50d25f364a24f5830a126180ccbd986c7090b45e1ad9f15272773caf9e11bc16ac27ee7c4ffd844f1d71d8a41f1eac25d00dd9b8e57ccd5d266e0354a26fe8dc0729e52a311ee07c09e93f11ea479b6accdf2a5f10d293b7a52fbdd3a3fea0c4a970a519156cc503b585498f46bde31979a33f2a74545feb8d44c694bf1fbed7682a3c7d89a92f51f244cb8971143ad8d4abbd02a14734c8c6da8d860682e3d21950b80819b0bc6e9719776a50aabeda29a195342290472c156a210b1c071cc55d044bf1b63412ad068484ccc32019bae101ff980c21fae1b3d7dd299dc5b9d73fbe7270bb5a32e279c85f71b414cf077fa769930efa954045e9cdca061aa06567dfeaca423046f42836eb718e517e43051081b16a3b35b97a1e11870fa780e5dfaef88594c709f366a813ae82c38df246758363976c300f812b6eee9b6836738e264024de499c32af98cdc93fb453e997bd8263d93abb7cc8f1d9882f95e3faa2a5713887cd6684b731a0b6df4d4b9eb3d4220662bc9e3df4990b991480460a67c7e1748b670728b46c1a34678103a9b4d6ae971bbfe906c84f1789e314c6f9a28ea012720dfba8a92fd04bce55229357e7dc743bc898e5aed67dfab2b2e56d4889dec4995ac57c5fec5fd052d7b47d96dd70f99033aa85a42bcfe2f8767ffaaf6c12e67848789cb87c36e4300a8ef9bb6921dbd710c42653b4d5ac6766cf7270ca7df2bfade8ef50edfaccde6b2f73e11e26da35fb632fc001bbe3e14050e543ae76967c3e5998c4207ea5bcfafe0aa22fda4af54f6c7cbfc4e437e5dfc148d9fa0b080023b94497d295dc5703df5285e7a6d3732f2b41ecd72feaee0ac3a3bcf6f3cd87cebec68f2971a545c701548b57038b11781fd8fbf4e13fc89c64f8c6a1517104e70bbbaecd3e2ab8c0a617174080c6f158c52e97b8c1bca44f5e0bd29900dfb5fc3bf2ef076101d17e7f92d9cceeb1e506c5a0d8670373496f1acb04fc01f1e101cc4d6af766c3b895cc5e1088b35318f94652c126801eef10ae1da7d25bfaa3c0859dca6fb441f7334e54a56c6fb32eac103f7646023d6614dca74a73713a8c947f5b40cb1e26562641f81306fe9f8307d9fe5a71f816d4fb318d782d10dc0e47a969b445cd7e03fafa31e6424682b777200d70a14a1b6a76d13dc9149f95a42731e6451f36984bb5e640ef428d1a039664fe2d659c9bf6f768463270b1e804ba235478d849bd3c6c4ec9b43da85e08bd8738e4a0b1814dc5ace10383dc98531a6c86810ea36302558eaa6d4904e8dd34f78de71dbcd993ee33343e58655f108d8b74c664810071f839f6c954fdd91a717804e3c88f9097b57922384b04757e4c8a7dd1781ee2c1950ecda0260363ad803fc1e775917a43ffa03326f1fc3ebb2021fabedb5be7a0f3b963f3566976b98cc64eece1f89855be2df0e3467fe2c12954ba6f4791d19389a7348f26e8ad0325792d32bdc6d0d93c938a82f2ca98fa488339eab9424bed8878c76ae927a010b9cc4d958428c6f583f4aa9ef829beca3014d889a7867b25f96f8da6eaf076a6694e859b1bcc9dff1a28570b6d354cc7eb86b4eb27317b07266b4a65584ae7e467e9e45533bb2afe8c5191772bd3259d62554c5962456e7c4bd04e11ddcdd1e8c0972c4a66458942c49e67a57951050c97798f5f7cf913dc7240b91be42bd98e3bcf784cf64f6f0a349cf5edbc2185a8d937072e556dd558990904793cd716ee9d258672b2b8e77e268ed46ef198084bb93bee8e26a0493bea17b874a6b8ee97804fb8b37f98ff36fffe8cfdf3351f72f57eb5554de2ca17d45107bdd1f765e987ca2c2272badb40ad54ac309017caafcf73e42599807e66a59ba3123545e391409a445f6ad8315c9ba61f9ac5e3ca61965696bd49c520f943d89a170dac576adb708a1e8ce4ed8f02a0b90118257c0a25c58e50b94222c341133c5d0a0db853a0e9e026e43e057639b3e4787535592f8dd19d2a22b2bf24f8be38d3bdad8b9cbd6fc6eea37db0e44e899a63b07372f91aa6dd4b81fe913e29058daa3293549b7195a6f4fc18f00b45b97329cdcd3093b18f475096b48cdc58fe5132961b294230111ca8dfd6ba9b057a0d8855d52a315a24a7951516bb3c0dd0fb1d73da763d4247230b4bff33376f1e5510d905c87b22f5151d34800af870f6c7e0facd5090eafa627de5de797f90f68952c24776b273049ca540547c704e7af5d334f4c54aee905a5ab613c47d06d8c1950f740004b23b5920ba52792516ff9976033b9d5727e44378b6e11ade2734bbe097f06d81be96dfd1b05d7776", 0x1000}}, 0x1006) syz_open_dev$sndmidi(&(0x7f0000000100), 0x0, 0x309000) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 756.188676][T15117] RAX: ffffffffffffffda RBX: 00007f376cf9c050 RCX: 00007f376ce7cae9 [ 756.196655][T15117] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 756.204623][T15117] RBP: 00007f376dc9c120 R08: 0000000000000000 R09: 0000000000000000 [ 756.212590][T15117] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000002 [ 756.220560][T15117] R13: 000000000000006e R14: 00007f376cf9c050 R15: 00007f376d0bfa48 [ 756.228542][T15117] 22:16:01 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 756.298890][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 756.418937][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 756.430700][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:16:03 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 11) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 758.340231][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 758.365088][T15148] FAULT_INJECTION: forcing a failure. [ 758.365088][T15148] name failslab, interval 1, probability 0, space 0, times 0 [ 758.379872][T15148] CPU: 1 PID: 15148 Comm: syz-executor.4 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 758.390432][T15148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 758.400521][T15148] Call Trace: [ 758.403819][T15148] [ 758.406771][T15148] dump_stack_lvl+0x125/0x1b0 [ 758.411486][T15148] should_fail_ex+0x496/0x5b0 [ 758.416211][T15148] should_failslab+0x9/0x20 [ 758.420761][T15148] kmem_cache_alloc_node+0x389/0x3f0 [ 758.426088][T15148] ? tcp_schedule_loss_probe+0x54/0x5f0 [ 758.431712][T15148] ? __alloc_skb+0x287/0x330 [ 758.436349][T15148] __alloc_skb+0x287/0x330 [ 758.440807][T15148] ? __napi_build_skb+0x50/0x50 [ 758.445713][T15148] tcp_stream_alloc_skb+0x34/0x560 [ 758.450877][T15148] tcp_sendmsg_locked+0xf47/0x3420 [ 758.456065][T15148] ? tcp_sendmsg_fastopen+0x720/0x720 [ 758.461480][T15148] ? skcipher_walk_done+0x458/0xd60 [ 758.466712][T15148] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 758.472100][T15148] tls_push_sg+0x24a/0x730 [ 758.476521][T15148] ? wait_on_pending_writer+0x4b0/0x4b0 [ 758.482073][T15148] ? crypto_skcipher_encrypt+0xc3/0x100 [ 758.487619][T15148] tls_tx_records+0x343/0x6e0 [ 758.492305][T15148] tls_push_record+0x2059/0x31b0 [ 758.497254][T15148] ? tls_tx_records+0x6e0/0x6e0 [ 758.502104][T15148] ? sk_psock_get+0x146/0x470 [ 758.506780][T15148] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 758.511979][T15148] ? find_held_lock+0x2d/0x110 [ 758.516744][T15148] bpf_exec_tx_verdict+0xdba/0x11d0 [ 758.521952][T15148] ? page_ext_get+0x182/0x310 [ 758.526641][T15148] ? tls_push_record+0x31b0/0x31b0 [ 758.531799][T15148] ? sk_page_frag_refill+0x6c/0x300 [ 758.537002][T15148] ? __sk_mem_schedule+0xa7/0xe0 [ 758.541937][T15148] ? sk_msg_alloc+0x6e8/0xaa0 [ 758.546634][T15148] tls_sw_sendmsg+0xd3e/0x2ba0 [ 758.551417][T15148] ? tx_work_handler+0x230/0x230 [ 758.556361][T15148] ? aa_sk_perm+0x2c1/0xae0 [ 758.560866][T15148] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 758.566862][T15148] ? __mark_inode_dirty+0x68e/0xd50 [ 758.572069][T15148] ? reacquire_held_locks+0x20b/0x4b0 [ 758.577441][T15148] ? __mark_inode_dirty+0x68e/0xd50 [ 758.582660][T15148] inet6_sendmsg+0x9d/0xe0 [ 758.587091][T15148] ? inet6_compat_ioctl+0x350/0x350 [ 758.592287][T15148] sock_sendmsg+0xd9/0x180 [ 758.596706][T15148] splice_to_socket+0xade/0x1010 [ 758.602016][T15148] ? splice_from_pipe+0x130/0x130 [ 758.607050][T15148] ? atime_needs_update+0x720/0x720 [ 758.612265][T15148] ? shmem_file_read_iter+0xac0/0xac0 [ 758.617634][T15148] ? security_file_permission+0xdc/0x100 [ 758.623272][T15148] ? splice_from_pipe+0x130/0x130 [ 758.628298][T15148] direct_splice_actor+0x118/0x180 [ 758.633428][T15148] splice_direct_to_actor+0x347/0xa30 [ 758.638802][T15148] ? folio_flags.constprop.0+0x150/0x150 [ 758.644441][T15148] ? vfs_splice_read+0x3b0/0x3b0 [ 758.649384][T15148] ? bpf_lsm_file_permission+0x9/0x10 [ 758.654758][T15148] ? security_file_permission+0x94/0x100 [ 758.660400][T15148] do_splice_direct+0x1af/0x280 [ 758.665255][T15148] ? splice_direct_to_actor+0xa30/0xa30 [ 758.670807][T15148] ? propagate_umount+0x1af0/0x1af0 [ 758.676021][T15148] ? bpf_lsm_file_permission+0x9/0x10 [ 758.681407][T15148] ? security_file_permission+0x94/0x100 [ 758.687058][T15148] do_sendfile+0xb88/0x1390 [ 758.691571][T15148] ? rcu_is_watching+0x12/0xb0 [ 758.696339][T15148] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 758.701637][T15148] ? io_schedule_timeout+0x150/0x150 [ 758.706924][T15148] ? __do_sys_rseq+0x750/0x750 [ 758.711705][T15148] __x64_sys_sendfile64+0x1d6/0x220 [ 758.716907][T15148] ? __ia32_sys_sendfile+0x220/0x220 [ 758.722193][T15148] ? syscall_enter_from_user_mode+0x26/0x80 [ 758.728112][T15148] do_syscall_64+0x38/0xb0 [ 758.732535][T15148] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 758.738432][T15148] RIP: 0033:0x7f376ce7cae9 [ 758.742847][T15148] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 758.762459][T15148] RSP: 002b:00007f376dc9c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 758.770898][T15148] RAX: ffffffffffffffda RBX: 00007f376cf9c050 RCX: 00007f376ce7cae9 [ 758.778864][T15148] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 758.786841][T15148] RBP: 00007f376dc9c120 R08: 0000000000000000 R09: 0000000000000000 [ 758.794812][T15148] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000002 [ 758.802783][T15148] R13: 000000000000006e R14: 00007f376cf9c050 R15: 00007f376d0bfa48 [ 758.810953][T15148] 22:16:04 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) (async, rerun: 64) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 64) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async, rerun: 32) listen(r4, 0x0) (rerun: 32) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:04 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x503142, 0x102) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001200)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000001400)={r6, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000003c0)={r6, 0x0, "b9b338ee1fc3124b0542a14d59f69dd68f5e7ff629966c92cadb9549cdb536d6e838d2af6f8ea2f3bfcae52bff48f67b6ac51c44116c9d5fe4311fdc028972064a7dc52ea618bc5e98356c1900294263c91476b7a25782052421afbf747d25ed0434ba060da890a8029c062b4960433d345c6a00d4f03e308fc9730dab0e64cd359e4a7b312e5afe0b92e77e8e44de82f0f0bb85c2a53f4b178aa2d9159a9db6f0a0ad009297f704a4205ba8e362e8972e10ba53904c13c13b551049a66477fb8b806ed2ebeb6894762f84e94f944602250bbbe1e5de8eb6bb146d95dbf71284672d1bc406f6509c7a885f5a4af3ddcaaa8d7db6d9bb8a2c6836c41f4d141429", "399ff18960ccd5d6f14d2260436bc59cede06536bd86c600ae1f92a27b13635a8743f1f8f2f4f453de0e82ebcf1d5d0e39110399500cdb5bf123e88d71cefb5b3b184802c6e62beae017c93d0f06c6e682907c9aa2c782d956e85d0ce7571850c93439147716ccdfadb331e2d60afe1a540138063cf1a46959b8a05314317bb7d481ee987da0d7cae0748ccfc42f95721207a1a5cd7befb521e77ec285bf0c84fff778235da494dcdd0f5f3854f1b2c40230fda24305a3db1757c0dd7f2ce2cfbf2dfbbed1ba029e834dbc4a9333814beb3f3327e0b81909d97987615f64c83de6e5240cebb8795937d9ea09b0f5ff239f5faee55f225dc855c73016fa4a893e465f2554c582840069a9929760c189bb1440a0b4e6a0d1fb600712165656156bb93f1fa17e61851f9280a2abfa4dec85856bbcdefc7ec29a1c589f4632d72798b3ba0c98bb6bb92070d53d1ee9cd048580eb7e4e7263b8617487b088f6c33fb50545a3c7a0e569d0334c85349c46d70e795fa1ccdf52ab15ac62e908ca0eddad8ae3a32bc507d7d069a1ae1bbdda4dbfc9401f4e7dafbfb3cd69e6921941f5c4182ac3003e03e709b64a29e28c9a36c427577a7d487e5354515b344c3d89abb9d2abc1a6a5df0cce25779bfd12dc97e2a3af6b2b4e9b2e0f4a92b1897f327efc7d1a9a313372a097981e570a51501f4dff8b246f24755a526fd276a1f950a200b53757b2897f7e05abb7afc8450a05dcce9373e78f1a93cda7cd208d23e12f5ba600a9352b1524bb4af54e153b6112f65198cdd55d92cf1bfa899326122868b18c7cbb595985de1de50f3669f0c054dd726f443801f22fd86e84ea666e63283e247175df1b483aaaae96e8f4f4bc5f2d966b7b604e67e517efc6ef0147ffa15e516b5893c1d4a68a242f4eb826281d16bf8e7cf438a062c8f3512f1feab93689d81143e534a999a0ca97a6f699e028775495c566c8c1dd3df11457113aa4eafff8606cf193145e0107833d0a573ba300bb0bb1fd9749486586c5caaf2e8e936b649248e9cc25650e84d66175b915a491041fc068ad2228c17f17e1dcca5ed41f4577af8214b8523861ce0bca92ac15a530b3da9ab72c5a955d6c952ff427d9c40aca5244a192b8171a6318b4c1a42d1b9bda288aed451ffe34d256ad79049ef8dc75a5b88dd6ec07f5e592431c124b08113a611a7bb64e34e5152630b47afe9b3c98c409bb85f39882001c4a28f81e3d7fc5265b7fed439ab1c1ac3e4a0927196cb50cf9c2d48678989271ea4e348527c90e495412836ec2e2c37580904dc1d1d1cb26385ff2c1d29d307019edee3fb6745760b548ed0a0d277a1f9db9d8952ebdf85d654c3191108a7748f35711b3645f992d4b433f2a0b63f18b081934e82de35e3777046e1ab10735e1888a7c4e5cac83e0c6988bd833776a687bb7afd9bcbbc81ffe6b942bdf0ca8f96d760022fb76bff5f801680ca393951a48543e65e751f2597f7ac3fb7f0cf869a70b8b0a7d7475f6a0dfcfa203aacced98e640a1ab36350b5bfd8edcb81d8bdda8fd99519e8400e5c92ee8285bda6b878c93be12013f68edeb99f9bbf9eb95dd6b3bba56cc2faf7f53244e539a66a38e3f2c5854c53d28fa5271a4a88e8fffd6e8a05d0078b13a8b6a8c91f081022bb88412b6e512a38568a3daf1a154d2182c6640e52a33401504282a8fca2f578797df7c152c6428ea367bfe8297b9a3106e145918062c993959accc314981d6797890f3f97005d0b72dee20e9c94e3ab2aab130374aa7bb60536f1867370d033755cb42c005266eef68146f312ca2ca1e60015be0272e51812ee8bf48d21df364ba331161001b5ce2b1880c5f691426d1a07283f73f20f202eff1c9c3298244d7a898369ff76e0fbd5ec2c545dd26d90b42a6ae8ad1a5caf69db87e26505ccffe68a706d2b896163483f98181208a2ae5361938a86443b41903a418f48f186580c4d292157e619681f320e6dd656dfe7f574fe35973ef9f65b3e89791a3dd61e5ad50ec3e55ddee57f319407998e567956fd4965ebff64d059fe45928258769f849e1e03f8167cb051fbfae1d274d3073d2bfd79a52ac294f46b668411d497a504fb91d813272e1a6321b8052aae1134863c7c4792139141a0c40728eacac11b0333afef1081b72e298b261da3ad43e745042b982777a7dcea5b0017a3e541deabc19daf10fe427afe67a1a51595c943b571245c5c65fb4892ef4c8366bcd05b1d9baa66c25237f297af460e37530b8265f321484fca4f1ef83f74e9e7855904286fa5588478d6deaf5094daa055c04c86bdfa829cd2f560b2c84628e25b420452e8a579e90b5350e997d6814739b11cf28d05e9d92f3d68d22d3f088e00f39eb173d908404a924abc1b0767449c0693e8eaae93edddaded420210169d57351ee210393a960fe5f3af139de1422111c4764849b370bb0164b58440e01b88ef0beb3fe182b6090d424a2b75b10d0ac495138ef171ef9e4ad6d11bfad70d4ac0dcbcc767eaa8bc4be7cbde63214e37fc53e17731f29254931760bc3412c09915cd653cc58e6e69f64b449a4339933e2648cfe1532e01da91d805bb2ac63d230d60dcc4b0bb5ca9617e2784ede9185a67faf630af1f013e183d299925c97f179670df1a2f21aaa6b945a04f3287a414374f143e2da7cb6990e9cd2b45220c7f9c1bffc7d40a8442a11079438e3cba24b85c1b7b28297bf82b8250062419196b872b9675e70550ba1b0354fe718ceaeb91b7c92c5c8622ace9fc2643fd6c6d018bed1e6947ca1d5f30e61cea2a322f4ff5987075aabf7ec141862df0a2d6d2d8891e119f7991a98a2320a6c3f21736eb60d470e97578b1a00f6870c3a48feee3192f6a1252e6cfbe83ba086513846553b427da063d43da1d9ca5e60160f589b4c770f20f7b2a191f14e5136b9e1697939052e952b67aa920fefaa6ab1e550e2ae33b4461c966453ff4f509bdb055645e57839d491c42cefdfb12423eadd8b3e9657b2ea62fcfa0c86c41c85fb6c966c2fedb850ab2469942839390b066d67ce5f2d300a1ed3e961dd48f516ec06ab7d5b3518d141430708f9b340fc5c6f4f98a8fd5f7c5d1fa8ba3eac32196146b6c24fded2ec7ce26dfafd91342c9e8691243efba276e84e10f097b994cbb2eadc23d5e12ab08ebe4ad02bfe3ae53030c8d6144487125ff83cac2223b2e0481ea1083f57bab278942c0d6f2f54de5cc70283a8a225859e1b5c353fabb73883af91be576f20a18a640b46dabc5bc287bb0eb9a7296380340c343c0013bb973f2b3169b794dc93bb2fbe51a83ca79544ba9af869f8b92dae57c83b67349162c5c2b5fc2bff6ca35d3b9049006c6010494cd90352b145af523b50f1ad5b6e0b55fec00a04d56e26098c22433efdcfe0c7277628c8054185a8920a09f9dc83dd3e9fa14a33eb2b463cfff0927f5da3a7c350d9db53690164dcf60d9e20db2b8fdbeef4f5175861696e4e32893d1146c475f9372f2a5cd075de978dd88e5795275519c7d4982f3f85506504a9fe338c491dd2b1d5e494dda7f1370274e2329273c9fbd3135bd6fc3a95f6b7bf6547231521d9b5597bf9bf1923cea0cdbea57f3cf62b75bc9f2435eb4e01462bd50110f70e4a80aa7d2855b51e2c39fe543b8afe65aaaf0d122e30be2c2cf8495563f3c5c5ac59b9fb99aed32dd6c86184b3a8e6b7b8295105b10650853971c831ef40ccabc3b0e68f21a191d2ca367885a1f2b2498fa21545cf52a88490dd29bb0cbc851aae990d8213f566d9ab1d13928f3389c230a1b02ef79b6ced53251af8a34635c38f814f7de73247dda152efe2cff97fad1995be548c3d922809e5ed4f44ff166c662c8b4cca42c366685bb94e5a9641310c65671ce2ad7b99482bb512c8629b95bce82701c93a5e583ac6e2f2f34a7850c94f0d0afd661feaf83ffb28222fefe218937c11ba525a593db0f66b9761855bd79c04384ee53cfb90c89e5ef2d21ec2874fb4b7429b1d395ef1dde46accc2e1ea6d558ba7d9e47368fd64fd8f20ba2e2d80c4529a4190b668d91a6d07433be366b59911b64b266859e43891d89105adb93cd2f32b37a56ce16eb173e927c37b3d820756afc32bf5dd101134e0637a6d5749493ea95087b4b9ccde3d77a4fcb14b1751a15ea6b19697fcc550392478445c280ba8e72549c3b58e8c4e8a060cf7798bad4fe98b8f826eeb535c43e043cc871de8709a3c90ce79fa9349be4f55142d713060bbf04c4f88ac99b61e3a5d69a7342e6c5e68560da451249195a6a13a37061b122d10775d49cd4640969b0ec929a4a3760b614216f8965fd753b10addd70dabd47224c1a88cc7ee07b25cd77e9207c66108c3c4d3896956f6f41a27378a5ce8e4f7c7ec823e08f01170b3ea9493c052ea684ecb1b75dddf979002e9b50241dc9a4fd5d7876e273e62911c641599c03092d0cf6ef40827a3dd101488302375dcf7281685a6b20d44b283e0360dfbe7ff30ab65e1572fdc654cbedec8241d645b786f677cb3ad032141303c69a80b0513ea4f32d4885ef88078f81fdb316dad2ebcae37aa83357dc07c8f56b1d0a8601bcff07a5d59b9e670f44ef629d26e9c62b8c342c121aba2b6a005446903ae3af3445621c9f76d9c3e28eaa7fc8e0a57622608ca55a932bf4ac8d8ca6930bc8783034474ee19af38b0153a1549275ee8f930b49e8a4cfce5e6a4d6691e7009625a7616368b29034515499ef38de3e3fa24a90e835c0cff3e7b1e598fb0e41fb15db11e5620274920fbe45ce904b3e4a1ca4f508739c35a710502c67fe502497e5397eda92f14386592d5c316773bb19df87e770dcafebda78595b02fd7107fd72d1e92464fe49790f1ae7f46c2207b5172a60a8fd84a5594daf56c790df6a5e1b7f6baff1ee48cc77029846c20d05da416c935769a2d6c968a590afecd956d40a159f453a48cf2e6f1a9a353d2ee53b0b6cb921c703b6aca1b5157c864811bb8db0b084af77aee89e02d4402f5b51affdc51eb07b761f432ec784c62ec59b71500494b528e0a38bf0dd5cee5c2e3bc69d66d8fd4f75c040395f4f67de2d1444758936c456c0346902ea4f32b7e4be13ac31566628514d69dfc3383fb5c3418126682116491015e24d011c5facae7eb3bc48ac296b369f48f6191806ab22d588717d6b1939e325aba4959b4d15cbc10f552c5bbae52bcdc266c44319b940a4277fe00413ce15468139d79b0d766626c67bc25e67ec88eed88a1626269da56e1ce3cdbf5d5aa4e27342c6bf7562e1038817c06cb91878d0bca2a0145e881b9908e36e798a46aa2550f749b6e922ef00a4937ca7079fa56993698758ada61cdd552e062307374a017d017da3020ed81e577314a7284fda47d0fcb10"}) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r7, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:04 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async, rerun: 32) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (rerun: 32) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) (async, rerun: 32) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 32) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async, rerun: 32) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 32) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 32) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) (async) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:04 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r1) (async) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) write$UHID_INPUT(r0, &(0x7f00000003c0)={0x8, {"961874fb62d7cd5d4984558cb25726dd2f686ec5d4f1704405122f1fc4eff0667c49a08d8d2d516ed708b5a7045feab074a95525014d46c4a90fbc16f8dd58b14cb0eef3d0f781d386081ff86eecd3974fb83712f5ffa9536f2c98e80f54fac3c917f10a4585b042b457c7a1be111aefd33641089189ecc7a028fed021984034126e38e751295ba0dd028617c7b9cea23b579299a006344cd25cbd7e5caaaddffb6ad417c3c1c219faf772ba1f8586f03eb42165b49703553b39e7f55a2f28aca438bf6ef9b523d5c3769db03f85afafaf20ffe405bc964df1b9a763f4c6beb4593adcd815a01be285c2112f8ad05d2d9025c9b8ed7c4676d4c57f3cd3d3e6439398c2aadb5e8b6256ee2ff80f5d8f3893fc2f8d4e83a60406e28077012efba89e48cf974db845ca00ff26bea13cc3ab87ffd39f11c03ed753de60c7f714cf49f2426a951efd93f69bff17aa2a1b067f0982dcd3709db407af99ccb63be0094da15d97f30787f371d8663b79c225ede83d600d525ee46adf6e6e2ac457eea3983839669319b706c93591252c24ff2057cddb53015e93cff2892aa12d18e034185b2440f964b87ac6d7c0d072f999e7344f1346e194f0de6e95b87bed93d30bf55aed8b45f640d1f0071898edaaeab2a2be6eac0dac8532320893c5646a5d6f567b15495f5976b6c6acc0328af966eb642c5a363cc455e441cb74e82bdf8bccda988ee811f369d13ae2cfc9e007db3bda8076ba18026df6595d718e5639d4707dcfa2d8757b61f1a2c3c3ab6ce13152a5be8b662e44e2f1c57583901e2308aa9cd592a2f9e57b1ee09fdf9403e7c59c9e3d1b18e3b86377b76b4c47c10bde139d987d7e3faa3efafd8c05257e0e61be39b50f236be578cbf8840886ff69b28c6931deee9a7faf5241e724152e24429e17428e5f68e15f7cafd9f1a81d0a7db06c07bbce23f9e06655fba9231019eb7784d0923736f80d0beaf36fa8e0c7f35cb04c401d8c67453393c65d593affadc2df2c9bf51dcfe208721905e9ba86ea1ec510f655fd3608260f348eab8c1d39ffaaae0eafea658dc38822693e8e34a645e6ce0171fafd876edf383d2f07b1657c0a8fbaf39ca8f7be0d74c9c523102f88df1340e5b3cd2543b9d0fa21cddce8841f9dce86dd3211afe35c6a279f339fe5abe09a637bcf60c5768786b31bee81353ac19f4a90762cf1f2a61e1c68d6cd08303600c5f44143c5cda59a44561f9b17a699c70bcdc2514301e00c7c27ac0a095c8184a770242a42cbf8abc7273c2c5e1369047e005abe87a52048ec0d43f38c915aad237e66745518aef09bd23911fdb9efe48f3fc1ade816efc7605ef1223819e168863fbdec7fe4502fe96a06b4db9a1059937c70d224a101f021b128a245fb19932e0fd5d5ac3d043e320eb9a742eba063f8b49106fbb03ad5bcc36c52515bcfee0713a2e0539a49f3db37271cda94fa15e306ebdcf50497b42bc2dbbc5bd6f81b00eadd7ae8c5250db7700dc3d2464dc04d9139ff574b4c955f8c2b4b3eff35e72edf54e8d85ba38ef520051f04120516d728d1b4a190ea6fb292a6ba5ccec9a9b03efa4767d3c26fff244311a889a6f018c861389d223f33f17d2b8f18e648713d862eb4f306c58c795d58feafc7e7e8b3ec5315f0b74f89c9eb30e6c834a50cfe647b799e2785b54bd3d3e091c9ac7390dce1dd2cc064f6b1a7b14cae95376d233a7ebcab741b15466fc0af5bee2805d46cb789e503edd62f521d921e0d79fff3122cc2140cc5171f45f3c7ba878a78fc106e5184852eac5c3d8b6a1449a76f87f194f75cf65a5ee5d5afe4d622ee0625ff21aeca470af1d4a32b84cc26d517a14a4b1e6fbb61f0ee2a6f9e9b8871ee38cfcde5ed01cb0ec73d5b2c88e33da3bd849a5f0e8cdaf8217cc52bf6ed0ee4d1936d1771fbc4e21c29c74b05d3137610d4b04093dacd197763f823c5ec89bd465936b854db9d88920f53cbf1bcc98ba4e6eda5f26d1d6101ce66afafb6b5cf4f6f97dd975071ec2bacfd3eaa8f624b64834c188b783e02a4b76d65218ad3f09d74906d6c4546a11d21a1dc11c8c97268d220a7abd15ba94cd142c8f3475c423ae68bc1bd8c80983cf279c90bdd73cf76f897f954ddaeb4fe6b7e7ba68811f7ff4ed1b3683554b12463397f581434aef76284c3693275ca7f954e8823032e37af489f7c0e4bbebbbcd6f8e7fdb88b7445e2eba0921a76f35cda58071fdd806894111d6fbf71ac82a116ccb499b41ca0fd0da47922f140fe1d81e59d17294635574f8a9510496296bb8ecf1786c5db15f87473c0b2baefa0194446a1df00e8f67cfbb1a5442a8ef9dc532054f9be0789a724d31e7e7ae854f8a0d326123f7c171ddde545f03f037ced2d19a5afe49de3afa35770383ade660d31cc0250afa539743537eda976e8f0944b72ca34ea34832f97bbf8412eb445c561334a65b7b9e23aca0bbecaea054d2778605bae3bb999c8699a7fc88318f9f695f12891f3c526bbc90e87b1a466789f2e5247b04c940f5b7bc770dbeeea9f85f844ca490588c58ad940b184ce28277130e1fd1e5a7152712e054bf02a60042a7d8554d626be5fe1fc6cd1a47ff1a5457a6c761498dc747bc0d4327c8488ccc895de873c242d18b06b5e29ff509d9c3ba9ebf9e7bf99ce27eb47e68c6aa7486c6a73a63a75cc01151a233e07bcacc34345c912c8b5178a41c8192060a51b7d234bf1bbdc6bac40597409c0204a89b09254cd5c094fe23a9cb73df4d2ca3724f9b2581092bdc96f761cbbc96bfd1cfb90d47cd2d56426b60e2475cac7779060538c6f37b6bda77bdc655010d3deb64755192d24062f435dc8286ffd2ce84b071b8d271011640b0908604731cf397044a6f4d49bb8f33e29a908e29affefa70b2f0d9474d2833d3183ece833b5218f08c126d455931378f098aa80eb82df7775f8b4f8d5457a9dac38fdefc3d771c29df7a347913149f6345878f6c0ae5234f011c3f613ff268fdbc24c733d67d036ad2f0114369b71d2257b352fc85c751a1c328a320efc15f64817c76855324a26641f6552715ec5ea12e301bab6597eaf099d9b4ce8ef491dab9c5e37d9910d28bc93f0008b70f90baa4dfeee2bb16149a63177f1e48550843a89264d4e3d3461f2b3c8c9dfd56ed2c2e4eadd6d845a9d363fd6765cd2bd5aa2b2bfcab9f555706cb374e168f6be474f9fb084ce8bbc33afe7283f3f638347613bae6d5f3d2f6538343433d6f5af47baac60d0806cad9f7d7672f6244b5e2cb35fe0f58b10e7e03b57a2d7c85e06066cc93fe4296269675569f4713a0d4cf5b2baa3694bd6882c9eed590fa710fe136515d27cb746f06bb932e9ccd884f76fb2fe67ffa86515cad41e630ba65f9335ea568abc4f2b5270bba573cc5e3c24375cfebbe6b396849c8c4d148850696e6868771c12597f934f50e1a5b928971d25cb0f50d25f364a24f5830a126180ccbd986c7090b45e1ad9f15272773caf9e11bc16ac27ee7c4ffd844f1d71d8a41f1eac25d00dd9b8e57ccd5d266e0354a26fe8dc0729e52a311ee07c09e93f11ea479b6accdf2a5f10d293b7a52fbdd3a3fea0c4a970a519156cc503b585498f46bde31979a33f2a74545feb8d44c694bf1fbed7682a3c7d89a92f51f244cb8971143ad8d4abbd02a14734c8c6da8d860682e3d21950b80819b0bc6e9719776a50aabeda29a195342290472c156a210b1c071cc55d044bf1b63412ad068484ccc32019bae101ff980c21fae1b3d7dd299dc5b9d73fbe7270bb5a32e279c85f71b414cf077fa769930efa954045e9cdca061aa06567dfeaca423046f42836eb718e517e43051081b16a3b35b97a1e11870fa780e5dfaef88594c709f366a813ae82c38df246758363976c300f812b6eee9b6836738e264024de499c32af98cdc93fb453e997bd8263d93abb7cc8f1d9882f95e3faa2a5713887cd6684b731a0b6df4d4b9eb3d4220662bc9e3df4990b991480460a67c7e1748b670728b46c1a34678103a9b4d6ae971bbfe906c84f1789e314c6f9a28ea012720dfba8a92fd04bce55229357e7dc743bc898e5aed67dfab2b2e56d4889dec4995ac57c5fec5fd052d7b47d96dd70f99033aa85a42bcfe2f8767ffaaf6c12e67848789cb87c36e4300a8ef9bb6921dbd710c42653b4d5ac6766cf7270ca7df2bfade8ef50edfaccde6b2f73e11e26da35fb632fc001bbe3e14050e543ae76967c3e5998c4207ea5bcfafe0aa22fda4af54f6c7cbfc4e437e5dfc148d9fa0b080023b94497d295dc5703df5285e7a6d3732f2b41ecd72feaee0ac3a3bcf6f3cd87cebec68f2971a545c701548b57038b11781fd8fbf4e13fc89c64f8c6a1517104e70bbbaecd3e2ab8c0a617174080c6f158c52e97b8c1bca44f5e0bd29900dfb5fc3bf2ef076101d17e7f92d9cceeb1e506c5a0d8670373496f1acb04fc01f1e101cc4d6af766c3b895cc5e1088b35318f94652c126801eef10ae1da7d25bfaa3c0859dca6fb441f7334e54a56c6fb32eac103f7646023d6614dca74a73713a8c947f5b40cb1e26562641f81306fe9f8307d9fe5a71f816d4fb318d782d10dc0e47a969b445cd7e03fafa31e6424682b777200d70a14a1b6a76d13dc9149f95a42731e6451f36984bb5e640ef428d1a039664fe2d659c9bf6f768463270b1e804ba235478d849bd3c6c4ec9b43da85e08bd8738e4a0b1814dc5ace10383dc98531a6c86810ea36302558eaa6d4904e8dd34f78de71dbcd993ee33343e58655f108d8b74c664810071f839f6c954fdd91a717804e3c88f9097b57922384b04757e4c8a7dd1781ee2c1950ecda0260363ad803fc1e775917a43ffa03326f1fc3ebb2021fabedb5be7a0f3b963f3566976b98cc64eece1f89855be2df0e3467fe2c12954ba6f4791d19389a7348f26e8ad0325792d32bdc6d0d93c938a82f2ca98fa488339eab9424bed8878c76ae927a010b9cc4d958428c6f583f4aa9ef829beca3014d889a7867b25f96f8da6eaf076a6694e859b1bcc9dff1a28570b6d354cc7eb86b4eb27317b07266b4a65584ae7e467e9e45533bb2afe8c5191772bd3259d62554c5962456e7c4bd04e11ddcdd1e8c0972c4a66458942c49e67a57951050c97798f5f7cf913dc7240b91be42bd98e3bcf784cf64f6f0a349cf5edbc2185a8d937072e556dd558990904793cd716ee9d258672b2b8e77e268ed46ef198084bb93bee8e26a0493bea17b874a6b8ee97804fb8b37f98ff36fffe8cfdf3351f72f57eb5554de2ca17d45107bdd1f765e987ca2c2272badb40ad54ac309017caafcf73e42599807e66a59ba3123545e391409a445f6ad8315c9ba61f9ac5e3ca61965696bd49c520f943d89a170dac576adb708a1e8ce4ed8f02a0b90118257c0a25c58e50b94222c341133c5d0a0db853a0e9e026e43e057639b3e4787535592f8dd19d2a22b2bf24f8be38d3bdad8b9cbd6fc6eea37db0e44e899a63b07372f91aa6dd4b81fe913e29058daa3293549b7195a6f4fc18f00b45b97329cdcd3093b18f475096b48cdc58fe5132961b294230111ca8dfd6ba9b057a0d8855d52a315a24a7951516bb3c0dd0fb1d73da763d4247230b4bff33376f1e5510d905c87b22f5151d34800af870f6c7e0facd5090eafa627de5de797f90f68952c24776b273049ca540547c704e7af5d334f4c54aee905a5ab613c47d06d8c1950f740004b23b5920ba52792516ff9976033b9d5727e44378b6e11ade2734bbe097f06d81be96dfd1b05d7776", 0x1000}}, 0x1006) (async) write$UHID_INPUT(r0, &(0x7f00000003c0)={0x8, {"961874fb62d7cd5d4984558cb25726dd2f686ec5d4f1704405122f1fc4eff0667c49a08d8d2d516ed708b5a7045feab074a95525014d46c4a90fbc16f8dd58b14cb0eef3d0f781d386081ff86eecd3974fb83712f5ffa9536f2c98e80f54fac3c917f10a4585b042b457c7a1be111aefd33641089189ecc7a028fed021984034126e38e751295ba0dd028617c7b9cea23b579299a006344cd25cbd7e5caaaddffb6ad417c3c1c219faf772ba1f8586f03eb42165b49703553b39e7f55a2f28aca438bf6ef9b523d5c3769db03f85afafaf20ffe405bc964df1b9a763f4c6beb4593adcd815a01be285c2112f8ad05d2d9025c9b8ed7c4676d4c57f3cd3d3e6439398c2aadb5e8b6256ee2ff80f5d8f3893fc2f8d4e83a60406e28077012efba89e48cf974db845ca00ff26bea13cc3ab87ffd39f11c03ed753de60c7f714cf49f2426a951efd93f69bff17aa2a1b067f0982dcd3709db407af99ccb63be0094da15d97f30787f371d8663b79c225ede83d600d525ee46adf6e6e2ac457eea3983839669319b706c93591252c24ff2057cddb53015e93cff2892aa12d18e034185b2440f964b87ac6d7c0d072f999e7344f1346e194f0de6e95b87bed93d30bf55aed8b45f640d1f0071898edaaeab2a2be6eac0dac8532320893c5646a5d6f567b15495f5976b6c6acc0328af966eb642c5a363cc455e441cb74e82bdf8bccda988ee811f369d13ae2cfc9e007db3bda8076ba18026df6595d718e5639d4707dcfa2d8757b61f1a2c3c3ab6ce13152a5be8b662e44e2f1c57583901e2308aa9cd592a2f9e57b1ee09fdf9403e7c59c9e3d1b18e3b86377b76b4c47c10bde139d987d7e3faa3efafd8c05257e0e61be39b50f236be578cbf8840886ff69b28c6931deee9a7faf5241e724152e24429e17428e5f68e15f7cafd9f1a81d0a7db06c07bbce23f9e06655fba9231019eb7784d0923736f80d0beaf36fa8e0c7f35cb04c401d8c67453393c65d593affadc2df2c9bf51dcfe208721905e9ba86ea1ec510f655fd3608260f348eab8c1d39ffaaae0eafea658dc38822693e8e34a645e6ce0171fafd876edf383d2f07b1657c0a8fbaf39ca8f7be0d74c9c523102f88df1340e5b3cd2543b9d0fa21cddce8841f9dce86dd3211afe35c6a279f339fe5abe09a637bcf60c5768786b31bee81353ac19f4a90762cf1f2a61e1c68d6cd08303600c5f44143c5cda59a44561f9b17a699c70bcdc2514301e00c7c27ac0a095c8184a770242a42cbf8abc7273c2c5e1369047e005abe87a52048ec0d43f38c915aad237e66745518aef09bd23911fdb9efe48f3fc1ade816efc7605ef1223819e168863fbdec7fe4502fe96a06b4db9a1059937c70d224a101f021b128a245fb19932e0fd5d5ac3d043e320eb9a742eba063f8b49106fbb03ad5bcc36c52515bcfee0713a2e0539a49f3db37271cda94fa15e306ebdcf50497b42bc2dbbc5bd6f81b00eadd7ae8c5250db7700dc3d2464dc04d9139ff574b4c955f8c2b4b3eff35e72edf54e8d85ba38ef520051f04120516d728d1b4a190ea6fb292a6ba5ccec9a9b03efa4767d3c26fff244311a889a6f018c861389d223f33f17d2b8f18e648713d862eb4f306c58c795d58feafc7e7e8b3ec5315f0b74f89c9eb30e6c834a50cfe647b799e2785b54bd3d3e091c9ac7390dce1dd2cc064f6b1a7b14cae95376d233a7ebcab741b15466fc0af5bee2805d46cb789e503edd62f521d921e0d79fff3122cc2140cc5171f45f3c7ba878a78fc106e5184852eac5c3d8b6a1449a76f87f194f75cf65a5ee5d5afe4d622ee0625ff21aeca470af1d4a32b84cc26d517a14a4b1e6fbb61f0ee2a6f9e9b8871ee38cfcde5ed01cb0ec73d5b2c88e33da3bd849a5f0e8cdaf8217cc52bf6ed0ee4d1936d1771fbc4e21c29c74b05d3137610d4b04093dacd197763f823c5ec89bd465936b854db9d88920f53cbf1bcc98ba4e6eda5f26d1d6101ce66afafb6b5cf4f6f97dd975071ec2bacfd3eaa8f624b64834c188b783e02a4b76d65218ad3f09d74906d6c4546a11d21a1dc11c8c97268d220a7abd15ba94cd142c8f3475c423ae68bc1bd8c80983cf279c90bdd73cf76f897f954ddaeb4fe6b7e7ba68811f7ff4ed1b3683554b12463397f581434aef76284c3693275ca7f954e8823032e37af489f7c0e4bbebbbcd6f8e7fdb88b7445e2eba0921a76f35cda58071fdd806894111d6fbf71ac82a116ccb499b41ca0fd0da47922f140fe1d81e59d17294635574f8a9510496296bb8ecf1786c5db15f87473c0b2baefa0194446a1df00e8f67cfbb1a5442a8ef9dc532054f9be0789a724d31e7e7ae854f8a0d326123f7c171ddde545f03f037ced2d19a5afe49de3afa35770383ade660d31cc0250afa539743537eda976e8f0944b72ca34ea34832f97bbf8412eb445c561334a65b7b9e23aca0bbecaea054d2778605bae3bb999c8699a7fc88318f9f695f12891f3c526bbc90e87b1a466789f2e5247b04c940f5b7bc770dbeeea9f85f844ca490588c58ad940b184ce28277130e1fd1e5a7152712e054bf02a60042a7d8554d626be5fe1fc6cd1a47ff1a5457a6c761498dc747bc0d4327c8488ccc895de873c242d18b06b5e29ff509d9c3ba9ebf9e7bf99ce27eb47e68c6aa7486c6a73a63a75cc01151a233e07bcacc34345c912c8b5178a41c8192060a51b7d234bf1bbdc6bac40597409c0204a89b09254cd5c094fe23a9cb73df4d2ca3724f9b2581092bdc96f761cbbc96bfd1cfb90d47cd2d56426b60e2475cac7779060538c6f37b6bda77bdc655010d3deb64755192d24062f435dc8286ffd2ce84b071b8d271011640b0908604731cf397044a6f4d49bb8f33e29a908e29affefa70b2f0d9474d2833d3183ece833b5218f08c126d455931378f098aa80eb82df7775f8b4f8d5457a9dac38fdefc3d771c29df7a347913149f6345878f6c0ae5234f011c3f613ff268fdbc24c733d67d036ad2f0114369b71d2257b352fc85c751a1c328a320efc15f64817c76855324a26641f6552715ec5ea12e301bab6597eaf099d9b4ce8ef491dab9c5e37d9910d28bc93f0008b70f90baa4dfeee2bb16149a63177f1e48550843a89264d4e3d3461f2b3c8c9dfd56ed2c2e4eadd6d845a9d363fd6765cd2bd5aa2b2bfcab9f555706cb374e168f6be474f9fb084ce8bbc33afe7283f3f638347613bae6d5f3d2f6538343433d6f5af47baac60d0806cad9f7d7672f6244b5e2cb35fe0f58b10e7e03b57a2d7c85e06066cc93fe4296269675569f4713a0d4cf5b2baa3694bd6882c9eed590fa710fe136515d27cb746f06bb932e9ccd884f76fb2fe67ffa86515cad41e630ba65f9335ea568abc4f2b5270bba573cc5e3c24375cfebbe6b396849c8c4d148850696e6868771c12597f934f50e1a5b928971d25cb0f50d25f364a24f5830a126180ccbd986c7090b45e1ad9f15272773caf9e11bc16ac27ee7c4ffd844f1d71d8a41f1eac25d00dd9b8e57ccd5d266e0354a26fe8dc0729e52a311ee07c09e93f11ea479b6accdf2a5f10d293b7a52fbdd3a3fea0c4a970a519156cc503b585498f46bde31979a33f2a74545feb8d44c694bf1fbed7682a3c7d89a92f51f244cb8971143ad8d4abbd02a14734c8c6da8d860682e3d21950b80819b0bc6e9719776a50aabeda29a195342290472c156a210b1c071cc55d044bf1b63412ad068484ccc32019bae101ff980c21fae1b3d7dd299dc5b9d73fbe7270bb5a32e279c85f71b414cf077fa769930efa954045e9cdca061aa06567dfeaca423046f42836eb718e517e43051081b16a3b35b97a1e11870fa780e5dfaef88594c709f366a813ae82c38df246758363976c300f812b6eee9b6836738e264024de499c32af98cdc93fb453e997bd8263d93abb7cc8f1d9882f95e3faa2a5713887cd6684b731a0b6df4d4b9eb3d4220662bc9e3df4990b991480460a67c7e1748b670728b46c1a34678103a9b4d6ae971bbfe906c84f1789e314c6f9a28ea012720dfba8a92fd04bce55229357e7dc743bc898e5aed67dfab2b2e56d4889dec4995ac57c5fec5fd052d7b47d96dd70f99033aa85a42bcfe2f8767ffaaf6c12e67848789cb87c36e4300a8ef9bb6921dbd710c42653b4d5ac6766cf7270ca7df2bfade8ef50edfaccde6b2f73e11e26da35fb632fc001bbe3e14050e543ae76967c3e5998c4207ea5bcfafe0aa22fda4af54f6c7cbfc4e437e5dfc148d9fa0b080023b94497d295dc5703df5285e7a6d3732f2b41ecd72feaee0ac3a3bcf6f3cd87cebec68f2971a545c701548b57038b11781fd8fbf4e13fc89c64f8c6a1517104e70bbbaecd3e2ab8c0a617174080c6f158c52e97b8c1bca44f5e0bd29900dfb5fc3bf2ef076101d17e7f92d9cceeb1e506c5a0d8670373496f1acb04fc01f1e101cc4d6af766c3b895cc5e1088b35318f94652c126801eef10ae1da7d25bfaa3c0859dca6fb441f7334e54a56c6fb32eac103f7646023d6614dca74a73713a8c947f5b40cb1e26562641f81306fe9f8307d9fe5a71f816d4fb318d782d10dc0e47a969b445cd7e03fafa31e6424682b777200d70a14a1b6a76d13dc9149f95a42731e6451f36984bb5e640ef428d1a039664fe2d659c9bf6f768463270b1e804ba235478d849bd3c6c4ec9b43da85e08bd8738e4a0b1814dc5ace10383dc98531a6c86810ea36302558eaa6d4904e8dd34f78de71dbcd993ee33343e58655f108d8b74c664810071f839f6c954fdd91a717804e3c88f9097b57922384b04757e4c8a7dd1781ee2c1950ecda0260363ad803fc1e775917a43ffa03326f1fc3ebb2021fabedb5be7a0f3b963f3566976b98cc64eece1f89855be2df0e3467fe2c12954ba6f4791d19389a7348f26e8ad0325792d32bdc6d0d93c938a82f2ca98fa488339eab9424bed8878c76ae927a010b9cc4d958428c6f583f4aa9ef829beca3014d889a7867b25f96f8da6eaf076a6694e859b1bcc9dff1a28570b6d354cc7eb86b4eb27317b07266b4a65584ae7e467e9e45533bb2afe8c5191772bd3259d62554c5962456e7c4bd04e11ddcdd1e8c0972c4a66458942c49e67a57951050c97798f5f7cf913dc7240b91be42bd98e3bcf784cf64f6f0a349cf5edbc2185a8d937072e556dd558990904793cd716ee9d258672b2b8e77e268ed46ef198084bb93bee8e26a0493bea17b874a6b8ee97804fb8b37f98ff36fffe8cfdf3351f72f57eb5554de2ca17d45107bdd1f765e987ca2c2272badb40ad54ac309017caafcf73e42599807e66a59ba3123545e391409a445f6ad8315c9ba61f9ac5e3ca61965696bd49c520f943d89a170dac576adb708a1e8ce4ed8f02a0b90118257c0a25c58e50b94222c341133c5d0a0db853a0e9e026e43e057639b3e4787535592f8dd19d2a22b2bf24f8be38d3bdad8b9cbd6fc6eea37db0e44e899a63b07372f91aa6dd4b81fe913e29058daa3293549b7195a6f4fc18f00b45b97329cdcd3093b18f475096b48cdc58fe5132961b294230111ca8dfd6ba9b057a0d8855d52a315a24a7951516bb3c0dd0fb1d73da763d4247230b4bff33376f1e5510d905c87b22f5151d34800af870f6c7e0facd5090eafa627de5de797f90f68952c24776b273049ca540547c704e7af5d334f4c54aee905a5ab613c47d06d8c1950f740004b23b5920ba52792516ff9976033b9d5727e44378b6e11ade2734bbe097f06d81be96dfd1b05d7776", 0x1000}}, 0x1006) syz_open_dev$sndmidi(&(0x7f0000000100), 0x0, 0x309000) (async) syz_open_dev$sndmidi(&(0x7f0000000100), 0x0, 0x309000) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) (async) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:04 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 11) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 759.059796][T15165] FAULT_INJECTION: forcing a failure. [ 759.059796][T15165] name failslab, interval 1, probability 0, space 0, times 0 [ 759.108451][T15165] CPU: 0 PID: 15165 Comm: syz-executor.2 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 759.118939][T15165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 759.128997][T15165] Call Trace: [ 759.132270][T15165] [ 759.135197][T15165] dump_stack_lvl+0x125/0x1b0 [ 759.139876][T15165] should_fail_ex+0x496/0x5b0 [ 759.144559][T15165] should_failslab+0x9/0x20 [ 759.149068][T15165] kmem_cache_alloc_node+0x389/0x3f0 [ 759.154359][T15165] ? tcp_schedule_loss_probe+0x54/0x5f0 [ 759.159921][T15165] ? __alloc_skb+0x287/0x330 [ 759.164527][T15165] __alloc_skb+0x287/0x330 [ 759.168954][T15165] ? __napi_build_skb+0x50/0x50 [ 759.173817][T15165] tcp_stream_alloc_skb+0x34/0x560 [ 759.178933][T15165] tcp_sendmsg_locked+0xf47/0x3420 [ 759.184056][T15165] ? tcp_sendmsg_fastopen+0x720/0x720 [ 759.189425][T15165] ? skcipher_walk_done+0x458/0xd60 [ 759.194643][T15165] ? aesni_ctr_enc_avx_tfm+0xe9/0x110 [ 759.200032][T15165] tls_push_sg+0x24a/0x730 [ 759.204455][T15165] ? wait_on_pending_writer+0x4b0/0x4b0 [ 759.210103][T15165] ? crypto_skcipher_encrypt+0xc3/0x100 [ 759.215659][T15165] tls_tx_records+0x343/0x6e0 [ 759.220346][T15165] tls_push_record+0x2059/0x31b0 [ 759.225298][T15165] ? tls_tx_records+0x6e0/0x6e0 [ 759.230150][T15165] ? sk_psock_get+0x146/0x470 [ 759.234832][T15165] ? tls_rx_reader_lock+0x5b0/0x5b0 [ 759.240032][T15165] ? find_held_lock+0x2d/0x110 [ 759.244801][T15165] bpf_exec_tx_verdict+0xdba/0x11d0 [ 759.250026][T15165] ? page_ext_get+0x182/0x310 [ 759.254749][T15165] ? tls_push_record+0x31b0/0x31b0 [ 759.259940][T15165] ? sk_page_frag_refill+0x6c/0x300 [ 759.265256][T15165] ? __sk_mem_schedule+0xa7/0xe0 [ 759.270195][T15165] ? sk_msg_alloc+0x6e8/0xaa0 [ 759.274923][T15165] tls_sw_sendmsg+0xd3e/0x2ba0 [ 759.279722][T15165] ? tx_work_handler+0x230/0x230 [ 759.284660][T15165] ? aa_sk_perm+0x2c1/0xae0 [ 759.289164][T15165] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 759.295150][T15165] ? __mark_inode_dirty+0x68e/0xd50 [ 759.300357][T15165] ? reacquire_held_locks+0x20b/0x4b0 [ 759.305995][T15165] ? __mark_inode_dirty+0x68e/0xd50 [ 759.311207][T15165] inet6_sendmsg+0x9d/0xe0 [ 759.315635][T15165] ? inet6_compat_ioctl+0x350/0x350 [ 759.321363][T15165] sock_sendmsg+0xd9/0x180 [ 759.325799][T15165] splice_to_socket+0xade/0x1010 [ 759.330776][T15165] ? splice_from_pipe+0x130/0x130 [ 759.335827][T15165] ? atime_needs_update+0x720/0x720 [ 759.341139][T15165] ? shmem_file_read_iter+0xac0/0xac0 [ 759.346514][T15165] ? security_file_permission+0xdc/0x100 [ 759.352153][T15165] ? splice_from_pipe+0x130/0x130 [ 759.357209][T15165] direct_splice_actor+0x118/0x180 [ 759.362327][T15165] splice_direct_to_actor+0x347/0xa30 [ 759.367728][T15165] ? folio_flags.constprop.0+0x150/0x150 [ 759.373380][T15165] ? vfs_splice_read+0x3b0/0x3b0 [ 759.378324][T15165] ? bpf_lsm_file_permission+0x9/0x10 [ 759.383731][T15165] ? security_file_permission+0x94/0x100 [ 759.389377][T15165] do_splice_direct+0x1af/0x280 [ 759.394323][T15165] ? splice_direct_to_actor+0xa30/0xa30 [ 759.400077][T15165] ? propagate_umount+0x1af0/0x1af0 [ 759.405366][T15165] ? bpf_lsm_file_permission+0x9/0x10 [ 759.410747][T15165] ? security_file_permission+0x94/0x100 [ 759.416486][T15165] do_sendfile+0xb88/0x1390 [ 759.421031][T15165] ? rcu_is_watching+0x12/0xb0 [ 759.425804][T15165] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 759.431125][T15165] ? xfd_validate_state+0x5d/0x180 [ 759.436243][T15165] ? restore_fpregs_from_fpstate+0xc1/0x1d0 [ 759.442141][T15165] __x64_sys_sendfile64+0x1d6/0x220 [ 759.447342][T15165] ? ksys_write+0x1a7/0x250 [ 759.451846][T15165] ? __ia32_sys_sendfile+0x220/0x220 [ 759.457138][T15165] ? syscall_enter_from_user_mode+0x26/0x80 [ 759.463042][T15165] do_syscall_64+0x38/0xb0 [ 759.467458][T15165] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 759.473435][T15165] RIP: 0033:0x7f2752e7cae9 [ 759.477841][T15165] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 759.497534][T15165] RSP: 002b:00007f2753c220c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 759.505943][T15165] RAX: ffffffffffffffda RBX: 00007f2752f9c050 RCX: 00007f2752e7cae9 [ 759.513926][T15165] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000008 [ 759.523045][T15165] RBP: 00007f2753c22120 R08: 0000000000000000 R09: 0000000000000000 [ 759.531277][T15165] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000002 [ 759.539240][T15165] R13: 000000000000006e R14: 00007f2752f9c050 R15: 00007f27530bfa48 [ 759.547325][T15165] 22:16:04 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) syz_open_dev$sndmidi(0x0, 0x2, 0x0) (async) dup(r0) (async) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) (async) listen(r2, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) creat(&(0x7f0000000380)='./bus\x00', 0x0) (async) ftruncate(r4, 0x208200) (async) sendfile(r3, r1, 0x0, 0x800100020013) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) 22:16:04 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r2 = dup(r1) write$6lowpan_enable(r2, &(0x7f0000000000)='0', 0xfffffd2c) (async, rerun: 32) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (rerun: 32) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async, rerun: 32) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async, rerun: 32) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x1}, 0x10) (async, rerun: 64) r6 = creat(&(0x7f0000000380)='./bus\x00', 0x0) (rerun: 64) ftruncate(r6, 0x208200) sendfile(r5, r3, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) socket(0xf, 0xa, 0x20) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:05 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0xa0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:06 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) (async, rerun: 64) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async, rerun: 64) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r2, 0x0) (async) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async, rerun: 64) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) (rerun: 64) ftruncate(r4, 0x208200) (async) socket(0xf, 0xa, 0x20) (async) sendfile(r3, r1, 0x0, 0x800100020013) (async, rerun: 64) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (rerun: 64) 22:16:06 executing program 4: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 12) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:06 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) (async) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x2, 0x0) dup(r0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) (async) listen(r2, 0x0) ptrace$PTRACE_SETSIGMASK(0x420b, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r4 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r4, 0x208200) socket(0xf, 0xa, 0x20) (async) socket(0xf, 0xa, 0x20) sendfile(r3, r1, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) (async) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:06 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x503142, 0x102) (async) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) (async) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async) r5 = accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001200)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000001400)={r6, 0x0, "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", "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"}) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000003c0)={r6, 0x0, "b9b338ee1fc3124b0542a14d59f69dd68f5e7ff629966c92cadb9549cdb536d6e838d2af6f8ea2f3bfcae52bff48f67b6ac51c44116c9d5fe4311fdc028972064a7dc52ea618bc5e98356c1900294263c91476b7a25782052421afbf747d25ed0434ba060da890a8029c062b4960433d345c6a00d4f03e308fc9730dab0e64cd359e4a7b312e5afe0b92e77e8e44de82f0f0bb85c2a53f4b178aa2d9159a9db6f0a0ad009297f704a4205ba8e362e8972e10ba53904c13c13b551049a66477fb8b806ed2ebeb6894762f84e94f944602250bbbe1e5de8eb6bb146d95dbf71284672d1bc406f6509c7a885f5a4af3ddcaaa8d7db6d9bb8a2c6836c41f4d141429", "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"}) (async) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r7, 0x208200) (async) sendfile(r4, r2, 0x0, 0x800100020013) syz_usb_connect(0x0, 0x0, 0x0, 0x0) [ 761.497327][ C0] net_ratelimit: 6 callbacks suppressed [ 761.497343][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 761.523579][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. 22:16:06 executing program 3: open(&(0x7f0000000100)='./file0\x00', 0x503142, 0x102) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) (async) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) (async) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) (async) listen(r3, 0x0) (async, rerun: 64) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 64) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) (async) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) (async, rerun: 32) r5 = accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x0) (rerun: 32) setsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000001200)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000001400)={r6, 0x0, "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", "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"}) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000003c0)={r6, 0x0, "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", "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"}) (async) r7 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r7, 0x208200) (async, rerun: 64) sendfile(r4, r2, 0x0, 0x800100020013) (rerun: 64) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 22:16:06 executing program 2: open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "6814e35f9681f1fb", "43b4c1787a45ddffb6bfe8d0e8aa08a5", "d700", "ffecfd6e889a17e7"}, 0x28) r5 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r4, r2, 0x0, 0x800100020013) (fail_nth: 12) syz_usb_connect(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_mptcp(0x2, 0x1, 0x106) [ 761.949505][T15158] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN [ 761.961433][T15158] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] [ 761.969915][T15158] CPU: 0 PID: 15158 Comm: syz-executor.1 Not tainted 6.5.0-rc7-syzkaller-00168-g7d2f353b2682 #0 [ 761.980316][T15158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 761.990360][T15158] RIP: 0010:tls_merge_open_record+0x4b9/0x7f0 [ 761.996425][T15158] Code: 85 e4 0f 85 b6 02 00 00 e8 74 5c af f8 4d 89 f4 48 b8 00 00 00 00 00 fc ff df 49 83 e4 fc 49 8d 7c 24 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 02 00 00 4d 8b 6c 24 08 31 ff 4d 89 ef 41 83 [ 762.016118][T15158] RSP: 0018:ffffc9000b33f488 EFLAGS: 00010202 [ 762.022195][T15158] RAX: dffffc0000000000 RBX: ffff888076446000 RCX: 0000000000000000 [ 762.030169][T15158] RDX: 0000000000000001 RSI: ffffffff88d6ac2c RDI: 0000000000000008 [ 762.038144][T15158] RBP: ffff88805fbc6000 R08: 0000000000000007 R09: 0000000000000000 [ 762.046116][T15158] R10: 0000000000000000 R11: ffffffff8a40008b R12: 0000000000000000 [ 762.054098][T15158] R13: 0000000000000020 R14: 0000000000000000 R15: 0000000000000000 [ 762.062099][T15158] FS: 00007f43d562d6c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 [ 762.071037][T15158] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 762.077628][T15158] CR2: 0000000020c37000 CR3: 0000000027c76000 CR4: 00000000003506f0 [ 762.085610][T15158] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 762.093583][T15158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 762.101558][T15158] Call Trace: [ 762.104834][T15158] [ 762.107768][T15158] ? die_addr+0x3b/0xa0 [ 762.111942][T15158] ? exc_general_protection+0x154/0x230 [ 762.117509][T15158] ? asm_exc_general_protection+0x26/0x30 [ 762.123251][T15158] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 762.129350][T15158] ? tls_merge_open_record+0x49c/0x7f0 [ 762.134832][T15158] ? tls_merge_open_record+0x4b9/0x7f0 [ 762.140307][T15158] ? tls_merge_open_record+0x49c/0x7f0 [ 762.145870][T15158] tls_push_record+0x29d9/0x31b0 [ 762.150851][T15158] ? tls_tx_records+0x6e0/0x6e0 [ 762.155715][T15158] ? sk_psock_get+0x146/0x470 [ 762.160409][T15158] ? find_held_lock+0x2d/0x110 [ 762.165188][T15158] bpf_exec_tx_verdict+0xdba/0x11d0 [ 762.170425][T15158] ? tls_push_record+0x31b0/0x31b0 [ 762.175737][T15158] ? print_usage_bug.part.0+0x670/0x670 [ 762.181361][T15158] ? tls_sw_splice_eof+0x129/0x470 [ 762.186512][T15158] ? reacquire_held_locks+0x4b0/0x4b0 [ 762.191918][T15158] ? mark_held_locks+0x9f/0xe0 [ 762.197235][T15158] ? __local_bh_enable_ip+0xa4/0x120 [ 762.202540][T15158] tls_sw_splice_eof+0x191/0x470 [ 762.207843][T15158] ? apparmor_file_permission+0x21f/0x4f0 [ 762.213582][T15158] ? tls_sw_sendmsg+0x2ba0/0x2ba0 [ 762.218617][T15158] ? security_file_permission+0xdc/0x100 [ 762.224270][T15158] ? tls_sw_sendmsg+0x2ba0/0x2ba0 [ 762.229308][T15158] ? propagate_umount+0x1af0/0x1af0 [ 762.234609][T15158] sock_splice_eof+0x86/0xb0 [ 762.239380][T15158] ? __sock_tx_timestamp+0xf0/0xf0 [ 762.244597][T15158] direct_file_splice_eof+0x86/0xb0 [ 762.249830][T15158] splice_direct_to_actor+0x711/0xa30 [ 762.255394][T15158] ? folio_flags.constprop.0+0x150/0x150 [ 762.261053][T15158] ? vfs_splice_read+0x3b0/0x3b0 [ 762.266005][T15158] ? bpf_lsm_file_permission+0x9/0x10 [ 762.271386][T15158] ? security_file_permission+0x94/0x100 [ 762.277040][T15158] do_splice_direct+0x1af/0x280 [ 762.281918][T15158] ? splice_direct_to_actor+0xa30/0xa30 [ 762.287481][T15158] ? propagate_umount+0x1af0/0x1af0 [ 762.292695][T15158] ? bpf_lsm_file_permission+0x9/0x10 [ 762.298076][T15158] ? security_file_permission+0x94/0x100 [ 762.303730][T15158] do_sendfile+0xb88/0x1390 [ 762.308252][T15158] ? rcu_is_watching+0x12/0xb0 [ 762.313036][T15158] ? vfs_iocb_iter_write+0x4c0/0x4c0 [ 762.318342][T15158] ? xfd_validate_state+0x5d/0x180 [ 762.323470][T15158] ? restore_fpregs_from_fpstate+0xc1/0x1d0 [ 762.329380][T15158] __x64_sys_sendfile64+0x1d6/0x220 [ 762.334599][T15158] ? __ia32_sys_sendfile+0x220/0x220 [ 762.339907][T15158] ? syscall_enter_from_user_mode+0x26/0x80 [ 762.345822][T15158] do_syscall_64+0x38/0xb0 [ 762.350246][T15158] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 762.356162][T15158] RIP: 0033:0x7f43d487cae9 [ 762.360590][T15158] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 762.380222][T15158] RSP: 002b:00007f43d562d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 762.388735][T15158] RAX: ffffffffffffffda RBX: 00007f43d499bf80 RCX: 00007f43d487cae9 [ 762.396713][T15158] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 000000000000000b [ 762.404699][T15158] RBP: 00007f43d48c847a R08: 0000000000000000 R09: 0000000000000000 [ 762.412671][T15158] R10: 0000800100020013 R11: 0000000000000246 R12: 0000000000000000 [ 762.420647][T15158] R13: 000000000000000b R14: 00007f43d499bf80 R15: 00007f43d4abfa48 [ 762.428647][T15158] [ 762.431687][T15158] Modules linked in: [ 762.448695][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 762.533445][T15158] ---[ end trace 0000000000000000 ]--- [ 762.539098][T15158] RIP: 0010:tls_merge_open_record+0x4b9/0x7f0 [ 762.561083][T15158] Code: 85 e4 0f 85 b6 02 00 00 e8 74 5c af f8 4d 89 f4 48 b8 00 00 00 00 00 fc ff df 49 83 e4 fc 49 8d 7c 24 08 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 02 00 00 4d 8b 6c 24 08 31 ff 4d 89 ef 41 83 [ 762.641654][T15158] RSP: 0018:ffffc9000b33f488 EFLAGS: 00010202 [ 762.658445][T15158] RAX: dffffc0000000000 RBX: ffff888076446000 RCX: 0000000000000000 [ 762.684083][T15158] RDX: 0000000000000001 RSI: ffffffff88d6ac2c RDI: 0000000000000008 [ 762.700406][T15158] RBP: ffff88805fbc6000 R08: 0000000000000007 R09: 0000000000000000 [ 762.716548][T15158] R10: 0000000000000000 R11: ffffffff8a40008b R12: 0000000000000000 [ 762.732289][T15158] R13: 0000000000000020 R14: 0000000000000000 R15: 0000000000000000 [ 762.748107][T15158] FS: 00007f43d562d6c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 762.767790][T15158] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 762.780083][T15158] CR2: 0000000020658000 CR3: 0000000027c76000 CR4: 00000000003506e0 [ 762.795294][T15158] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 762.810759][T15158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 762.826676][T15158] Kernel panic - not syncing: Fatal exception [ 762.833082][T15158] Kernel Offset: disabled [ 762.837402][T15158] Rebooting in 86400 seconds..