[ 38.815176] audit: type=1800 audit(1564431608.235:31): pid=7467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 38.839625] audit: type=1800 audit(1564431608.235:32): pid=7467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.37' (ECDSA) to the list of known hosts. 2019/07/29 20:20:16 fuzzer started syzkaller login: [ 47.161460] kauditd_printk_skb: 3 callbacks suppressed [ 47.161474] audit: type=1400 audit(1564431616.645:36): avc: denied { map } for pid=7653 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/07/29 20:20:19 dialing manager at 10.128.0.105:34929 2019/07/29 20:20:19 syscalls: 2477 2019/07/29 20:20:19 code coverage: enabled 2019/07/29 20:20:19 comparison tracing: enabled 2019/07/29 20:20:19 extra coverage: extra coverage is not supported by the kernel 2019/07/29 20:20:19 setuid sandbox: enabled 2019/07/29 20:20:19 namespace sandbox: enabled 2019/07/29 20:20:19 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/29 20:20:19 fault injection: enabled 2019/07/29 20:20:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/29 20:20:19 net packet injection: enabled 2019/07/29 20:20:19 net device setup: enabled 20:21:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xff, "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"}, &(0x7f00000001c0)=0x107) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r1, 0x8, 0x5, 0x8}, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x2dc, r2, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x27}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xdf2e}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6ec2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x967}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd6ee}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4be8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7429}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2000000000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xeba}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x110, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8a74}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x18d0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x1}, 0x4080) r3 = fcntl$getown(r0, 0x9) fcntl$lock(r0, 0x24, &(0x7f0000000640)={0x2, 0x0, 0x0, 0x5, r3}) r4 = syz_open_dev$sndpcmp(&(0x7f0000000680)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x1c0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r4, 0x8008ae9d, &(0x7f00000006c0)=""/34) kcmp$KCMP_EPOLL_TFD(r3, r3, 0x7, r0, &(0x7f0000000700)={r4, r4, 0x44ac}) r5 = syz_open_dev$dmmidi(&(0x7f0000000740)='/dev/dmmidi#\x00', 0x5cfa, 0x4400) r6 = openat$userio(0xffffffffffffff9c, &(0x7f0000000780)='/dev/userio\x00', 0x200, 0x0) accept$nfc_llcp(r4, 0x0, &(0x7f00000007c0)) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000800)={0x2, 0x9, 0x1, 0x7fff, 0x81, 0x9}) ioctl$PPPIOCSMRRU(r5, 0x4004743b, &(0x7f0000000840)=0x8000) ioctl$VFIO_CHECK_EXTENSION(r4, 0x3b65, 0x7) ioctl$IOC_PR_PREEMPT(r6, 0x401870cb, &(0x7f0000000880)={0x5, 0x4, 0x6, 0x8}) write$smack_current(r4, &(0x7f00000008c0)='syz0\x00', 0x5) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000900)={0x8000, 0xfffffffffffffffa, 0xfffffffffffffffc, 0x3c48, 0x80000000, 0x9, 0x0, 0x401, 0x80, 0x4}, 0xb) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000940)=""/4096) ioctl$sock_SIOCGIFCONF(r4, 0x8912, &(0x7f00000019c0)=@buf={0x7e, &(0x7f0000001940)="03d46f53afbae283935716bdf3ca757d2d8b9f38d86255f5951d7da2678b5a86b699873c44171dd8bb73beddc48f6be020ca2b7eae62f905ba5ee84f9c635cc4ee1341bcd56c4b34e1c1f457b7a692d05da96309996252158dff49395bae79dfedb893d10bf043d38dbd1774e0f6b7611459083be056354717646c729c6a"}) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000001a00)={0x5, 0x81, @name="94b736013bf7560201221d7020a34ecd613d9414a7e04c871dd46efc28584ac8"}) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/vsock\x00', 0x42802, 0x0) ioctl$VIDIOC_DECODER_CMD(r7, 0xc0485660, &(0x7f0000001a80)={0x3, 0x0, @start={0x1, 0x1}}) write$FUSE_POLL(r5, &(0x7f0000001b00)={0x18, 0x0, 0x5, {0x3}}, 0x18) openat$audio(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/audio\x00', 0x10400, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000001b80)=0x4a8020) ioctl$EVIOCGREP(r7, 0x80084503, &(0x7f0000001bc0)=""/125) ioctl$TIOCGWINSZ(r7, 0x5413, &(0x7f0000001c40)) [ 147.917535] audit: type=1400 audit(1564431717.395:37): avc: denied { map } for pid=7671 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14963 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 148.034715] IPVS: ftp: loaded support on port[0] = 21 20:21:57 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$inet6_dccp_int(r0, 0x21, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'gre0\x00', {0x2, 0x4e24, @rand_addr=0x3}}) mlockall(0x4) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000140)) get_thread_area(&(0x7f0000000180)={0x3, 0x1000, 0xffffffffffffffff, 0x0, 0x10001, 0x8, 0x800, 0x4000000000, 0x8, 0x3}) bind$isdn(r0, &(0x7f00000001c0)={0x22, 0x0, 0x2, 0x10000, 0x2}, 0x6) syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@null=' \x00', 0xa, 'veth0_to_team\x00'}) r3 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000340), &(0x7f0000000380)=0xb) r4 = socket$rds(0x15, 0x5, 0x0) bind$pptp(r2, &(0x7f00000003c0)={0x18, 0x2, {0x0, @loopback}}, 0x1e) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000400), &(0x7f0000000480)=0x68) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000004c0)=0xbaa) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f0000000500)=""/7) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000540)={0x9, 0x0, 0x10003, 0x100000001}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000580)={0x5, r5, 0x10001, 0x6}) r6 = getpgid(0xffffffffffffffff) capget(&(0x7f00000005c0)={0x0, r6}, &(0x7f0000000600)={0x200, 0x80000001, 0x1, 0x9, 0x67, 0x3ff}) sendmmsg(r1, &(0x7f0000002a00)=[{{&(0x7f0000000640)=@ipx={0x4, 0x1, 0x8a5f, "b288bce6342d", 0x9}, 0x80, &(0x7f0000001800)=[{&(0x7f00000006c0)="1667fd966e419577f3e0645557ba87c92a5ebef47ce3", 0x16}, {&(0x7f0000000700)="a0d2c8188780b41fd3ad1175f0fcf1dfcc61d7", 0x13}, {&(0x7f0000000740)="b5314b0f281f452dbddbb2ead3acbead7a969680d812b7f3224c2ffd158bcf337c2ba09ad0549ef94932ad1d3d211b97b3b6de14ddb612943a246b9b26089c6c6ec6d28bc7f5ac042ec726a912522593f08b51fa70a6d0ec11e9738fac", 0x5d}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="e6d4ae921a8f241dfb4a7ed2feb10892c8807e181e", 0x15}], 0x5, &(0x7f0000001880)=[{0x30, 0x113, 0x5, "0e4b70749dc8f31ff44c5186cbc39b369289bfd715c3d1db9a"}, {0x50, 0x11d, 0x5, "086f769a593b439b7698da2e1bc2136b8dd84525ee7498d833440597960f322cce8a648eb0c6ce9447ee773ada3a80dac1cbc186285e9bb8039c7a"}, {0x1010, 0x12b, 0xf495, "aa2e502c66cd1daaa7e992fa9e04b0554c4281f85a5f094188d2051d7fbdf485ea82d91962b890fbd99525919c175539abe60566dc6ae5fa6920bb70e6e94ccf25f9df145a43b95fcbe0bcbb4c4c1f7ad54f34cfd80b056a2a757e7dac249f677c9bf4983d5a6afb2a85c4dd6a71b89003018c1e07ff521161a021f5f43afb788a0e0b07ec5f7323ca074c3d21d6dbb116d5372a409aa04478624237df9a5f2f96ec4dcc05aead1fa98f3cac239e5be8b8c00cdf4f2dea4ba5f04140e7a3643e6eb7b763559288daaff6ce06a8fc09eb721a551be8602544e0fc0ce114d105f209f9ef6a60eafa89dc8d901a4bf15a83d7e664f3d05591fca553e7a35db42dbceb3be042ac9942b044b537545b7f03e9d98f17998e1e17700bb109680bdfe8b88ec1ed53da74859370afbd6a3e290d5f4301a02043087210b71bfb8573f9aace30a4ab8ca01b185b667a525312e57a285b3c3364a934ea9976d4ecb79bf699bc349ede8a4054d8353291e3560aa5344b28ac8e5d4cebfdee7d930eae18d193eb59f339ecebd4439768dcad1999886c2afb336836ae9f240657255e728870205c6c4d066347a15ae3c2facc569c45724eaedcb28f3692e3215d68415cd6e9b63d6fdd6b20a2e736ad97aea25726bc51f659fedcd55e9f105bd961fe60ce297b210994a39bef84db38dcf0e496c2daeb143e7a6e8c33540aefd52e145bdee628ec0c96be79b7a1312b09422a61a8bd31e0c6c25db67db409b84a9df17befd117dd17f4512b051cf75d95fa25a1403e24ed4f24d01f80a8ffe92121768bff861884991d3c20fa05d33496df79963e779525fae1e9339c8a1ac87026b1d612a0042556ac689a31c7de928208cf8bbc4b4be6ffb59739e94a95610737ae6213ff2b1fce01c5f115dce7d684a225aac56e0b3ed25f5a1557d1cfacb7234c9402e5589123db47c27968fff0e713e1aabfa8eaf5aba11cdf6f4c0c85594177787b3badeeeaa275efe9a08e0ea62146acce8f79b93efcfc721ff5f8974db9a397922234dc056406c934d1c2db62259e2037a9da91f740bfe43590c9539b1f27c330210981008c46733be074b37f12db37f939cee0ad19750da7a1ecd61b4a8312050cfc9f987e25b248068fb8af18a49a78f9bc8af76c10398b2b60d759a2db3a7346312de73f8f310a7a31dc77b13cc27d5909ef6bfe110c768b0278877d82d74b6b348161db2396cdde3a5e7ea87b0d561589ddb46e45f7b94937e9438b71da6aa404d9a7ec0971ad6edd0511c5a2ed8c205e6e206f2109f988ec9ef27f2898a4703c3be27debfa316f2c35270a765e797c0eb3ce573ff1f6640176c4d3ca7ca058641e948a2c5d3348823f163c97821eaf87d59a78ffc1dbe78f0ba2b5d05e7d627bd3ac77e8e747628c6173fbd23d1ffe4c30106d9bb56959d81a00c0982790570647defda4068690738b4d6775c409a26fb85db31b7d061e02d11cc06fb120b0763ebd183918f4dd4e8484bea2a9ce5703559e7453845159616919ad7972c3f31ac51e9a07ffbe67633dc83d389d155e5b70a855ccc2861469070a8b0c1aa8a54616862978c8ada7b70bbbb2df2b947c4cfb44be92a14bd69785fc6f236adf6ef2a0d2059a4b13b0a6cde3692db2198e9254fe780b891aad58fe278851a174a4a5f78c5c901b0fcdbc837d6b1666103996371cccb187854b389c5cd9e188fe7da2655f36f271b8d5f6847f935e86c7eb3e63d42cc315a7c8a98977c59fab8149ce56d7606a159dc2be13aec75f95cc88a04d32078d40b8160f4485c08fd5237790700c5830141e6849bf2de16b57cf7a4db2e9fbdc13539215cdccc4e0f0ffb791595ad2a2051e952ca9f3626c3e419a69b53bb98b590ded759c3e285534cb033408baa43d88561434c48fb7ceb01c9e841106de7e3d8f88bafe5cf00169be1fdf5cfcefc907a3fac7e819e5c306537785f32ffb371f6a9a7dd3563fc4e538911ce4796970dba8da8e469ea00a9b649bf8ea0ce23f25767488ff70bea4a0f94bbc79938da915034b89cfb0634acefb7d9311f69e6906a712464401004261d244bbf71340627f66c0aab644d7e6389e875b56d4a52eabbaf0be3a0ff06ec82bcbc5e64fdd9d718484cebb4f19b32bccdfb8efc5f86a649d8a60b093d760030609c383cb1e01bfafe54c374ffc1f0952312b5ec84b4926791fdf0d93f85d0bb03399e23c1558105bd5d12b096446fea0868d2cd25a947eecada1cf5ec3c1e9a0bd6e162d24a1d3bc9a4fe9981066743218334476555aa7e12e2e348427de5e0822e6630fabe404cd03130866d2b40b0c2ed73d0f186ccf25a6cbe3a88997e3b6cab6430c69142cfcb81e0291f9e8933c3be6ba58cdedc2340944a8f41713cd8e7e61178514e2fe8cd9b1503da85cb9ff54bc64cf5f50302a6d53945bbd7df2734293193b6e6716ad5f1e02f7e12bd7de1e3fffb5a5e2ad56fd46a6266842c5a690282d5c6ef0415b60bea2a43da38857bd20c35e5b67b81edc83f543a1bb27cf71d7444b55147a325a0ede1caa3e703d9c41e04f7da5870be782a91130851d87f4978b95babd02fc70a45ea1f17f25f7ee976d0e002bffd8055f49f0a90fc8476edc648d3d703240aac14f96be598d72400aa11dba645ae9ccdfd4a927e689ecc3883f9ca66a780f2bee5c16f07faed955d5cf5eecbe3897e2d0e0cd46c3b3c39e883210b21d8a65524fbf4614c7d97e2080f1fd98c2221a72555c2be72db4977044a15f965544d669cdd360c2c7306c139068f50451718747d80e413f121ad8deb1b8539867f42af2556d791ec3d16af935c315728dd1b02b337541bcc66368fa02b96826818a88e543e4473003a6619f7b340f9c9366b6e3602e6148dd9cd31337b35108716a04a7ac33588d6fb7a46283cde3b45bbc8c789f10de5f0b10b5f8935421b2fc0b48b59ec680f86923a5e24a6b30c36578f3bbaab34f10baabf1bdd4e74bac71af84a6c0ae62a3d4dba7005da25df7a10ebda15a5527f6c25f9736c3d6bf1f7a133f36042ed0c83138bb1821518be6cde397ee39815573fc2fe1733711e5b7fc1a0d690eda441445633a50ca5a8da43009380622ae8307fe6796ec36ad159e6b7fbc695bed6d915c60cdcab5bbf6b93d3772059d52fb3e21cf525277a013da091e759a503ee1f54a1f49b01cc0d1c0688c9af6d6fef611017a9c203c422c2a9f8a8acf2dc46e2a50039f4fb45b8756e8b694cd8d37fb5bfe9225c3b70048f19b204068349ed7bd01dcf18f780713a2389bd8573b07f1d680e3f9387cbe3b4acb091bab7a97f10a36ea2ff5f748fa046052098e5cc52ec3be0fb4cd0fa6d92105c1d8b15d4ef1f298116811803342b2648f8c079c044f1ecba44d7e44a9f77272d369cb7f77ff6567fffbd816135365a785fbc1df155f55e6b82d52a3b60b49e9c9533c4dda73d498f31e79e0461210b7d4206cb2ff8353dc8cd217b55797fdd671b4fa56b86cdc9570a8a18d546879f9554b9b3e0515541a4823560a516160314d626162b4427becfb252822d68cd112a001467b1d85a4a90dbdd1e22c73ee4bcddfeab51c13beeb809a1c1239daef4cb9fcdf2c59ac9cdfe773e4f014f2dd9abf1f61a0edfac38b6aa6b62bad049a632267187675dde9d8dabba348cc9f7a96628d2dc4b525b4a8ebdc2efb9131c81b7b354e20bb53b86e9fe432ae606e7b8ee9374c72a4f632691faf2f021f436d88bba539e0bf96cf8f6c24a0c5d23bb31d6837393bf591bfd56f06d04b275e532eff4c08dc5dd60b761cf78f2d38c65071ef3b9a88600dc8798c9b77bed47a71c1dc84fef09ceb2d7f8ab0f3602bf283c03b7be11b15a3582f838d30ba124f390b94120f4f7daf2f3c2ca66c774d73e28d388b4fca0fce478cd66045a796382f44c93c9be3b7273eaace6e5d3a078d88ec200a1021c031ca08e45e882c6fd1a3f884d4019839231225816dd1ca28d8456e092358cd9aea08fcacb2289fe7cd30140dc4bdb49c2c1b93ddbd1d563e870eb9d9bdb757576b2809218ad863198c08073159642cbbc7272f440b197128bbd152a54a62138fe6a3bb0dee998d35b7573122b6c5846efff5c58fe366304b10de8ec823dad7b77c98ab81fc9da7d875734ef5c073412ccc12a3cea8828f86722a5d4aaac69fcd670cf5a512efd8273c26a37a7e9860b723cbd72d5aab1e98f57f329a8ee24ce18f833ee89b3126a2dd56134d4318e56b336efc7c02d1dab184c10d745f91864fe3162e3805bd80cbb21b6889fa6b652965b5ffba2904fcb2df21f997058976568cc032c9474fa34c18445d0c8cbd10a5140e57dbfc13e0c46ca814ac7e2aba0516b882ce22fb2533a2d19bbaa5615ee3ee05502002bd7a0148ff7d776f2671f6171817b806dff3e2109aaebb1f38d5dcfc1435c6f36d05d608d8d6e61b0f803f79b2a8c9611e534b17078a4f8577bbbf2bc58a2ff2dfad80135216518457b27e318a606b450e1334e57400f6e19a4fb5a154736724456947520cd6dc23852867e174fd80fda314c04f8da59299cb82f386d5acd9d7c05046a3cb0fdbc7f13c56e98deb875c5dca61057e3bd8d36ea1e3b01ff0638960046256fbbf4a877f0d762b09de034c4df93905b3c0597d3bef5c5a593326c832f6461b240aa32382cb72f1de429b31e7d87624a1fd7d96f52661830c4ae3bda87b95cfd980d9eda8d2b3fe4392e40cb6262ffd783c27bbcea8693552e5293b9a4899152f0a27096f712c2a7bdbb165a953b2308cc8b91352de9835c2e7851540e6806bfdbab9cb41f807a605f9944e1fdcd77a005caae8b448a4519f33159b2b462b918611aea85211a6c728713c5891c67ab02760da0e38f3de9ac5681d889b4d9b439f4dbdae39f1bbddaa76fd40885ff5505a3d2f404f40f08e10b809996ecccf92a133f0f5ac5a699741e39a7365f6079ed5edc6a04b5f3b4bae1cceed8ca8db4094475fb2ab261e7c5ca0ec00303979d5a5f080bdc8acd989ced78686dcd46c6363fe6b201d09566850fe4515a05a326cbf9e883b833aef3ec90b9c46507fcef6573b8c60e2d6b5e5c2f5e615e44a59ece227c4f1d2130622fabf94b6e767abf10aed9cb8411d8b80638beae6bb65fbb57eb804926e99d6e22a3504b5625c33d42924ce438aa86a59688c2fd5b88cffc5c90a4776dbe60c15fde0f5a72ee3497f8facdad5a3ba5e5dd46e5610c15ee8fc2c40b6100636ffab184974fad2920f792d9fcf017f2f0bf7b17d6efc7c7e5e35f25a6df68316eecf1371696b455f67cd2641593ec18fb9a237da1a27ecbae4d71df1b867b16c862e2170d57a20e50959b426721d53ca91c5ab1a62dd00c18e4f408a28f90261c873efc3c53269788c85ac811305e62f8d4e864ed42a9a9d23f909f59737a2108f2c142ad60665e7fdfd7c9a657a78da247d295067f911b2854c312f0ffa01c687d4d6257e471946a154ab2dae43ff493e0f00fe0ce1af206d5eb2636ad8a89d78e4b489531ddd01811fbf22dc875ee18bb424c567ec8ed880d4d1a7bac36aec2b77a44c49d7504e5cd846a2f7ef498fe450a7e1edabcd5ee0c2bcb668a87d0cefb142fea9f1585b741806534a268133607b87c9af1e4d85c39b42e7b321e01865cddf3793aee3fdea5bf0ab25aeef8abcf3c9a7bf89471cd9672ad1290e8765e159d64c76466d184c6ae9cb990b795734afa05ec967419a9531b98f34aa103265562ec9a2fe2a9c042d9dfe3862ebbd3e72e9ed044d915fc8e6c3dcc26245d6be9e078fe843f66a2f"}, {0xc0, 0x88, 0x8b, "9d3bfd6d85d3eb423ab1d9b326d29af73ef4a2ecf2199390e1bb212042e375c226af80931c46442ceb77f0d9d20de68684e8b51c84d15d1e8387e2ff06c8e2f99ff3770f6e40be485e60c14d1f54c0c00cb76c5ccfd70f5d079d9a1fd1ed6c8a612d22a93a3eff0b94ca034fb1df103b97d4137950ebaf586fa9c6088d533c2de564565410f2d00be6b9bf57158bb08c7f117a8159ecc0102b3dc94b71cd590e0c4c3ae3c2b36537220194fca0bad4"}], 0x1150}}], 0x1, 0x4) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000002a40)={0x3, 0x80000000, 0x20}) mq_timedreceive(r1, &(0x7f0000002a80)=""/195, 0xc3, 0x100000000, &(0x7f0000002b80)) getresgid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)=0x0) setfsgid(r7) fsetxattr$security_smack_transmute(r2, &(0x7f0000002c80)='security.SMACK64TRANSMUTE\x00', &(0x7f0000002cc0)='TRUE', 0x4, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000002d00)={@in={{0x2, 0x4e20, @empty}}, 0x0, 0x20, 0x0, "fcd53eb5313c33a4bc8ae41ce99332a73af590270c19c9c75731d2a77d27595bbbb11f85d9158ec6f4552698712b1bf3b90005da750deada23c2d63ae5cb48a527ba1d69f2a900071f58096421f4a713"}, 0xd8) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000002e00)=r6) fcntl$setsig(r4, 0xa, 0x40) [ 148.182393] chnl_net:caif_netlink_parms(): no params data found 20:21:57 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000080)) getsockname$llc(r0, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) r1 = dup(r0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000180)={r2, 0x2}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xfffffffffffffffe, 0x10, 0x6, 0xff}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r3, @in6={{0xa, 0x4e22, 0x7, @loopback, 0x6}}, 0x3ff, 0x100, 0x2, 0x4, 0xc0}, &(0x7f0000000300)=0x98) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000001440)={0x1, 0x80, 0x1000, 0x1000, &(0x7f0000000340)="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", 0xf0, 0x0, &(0x7f0000001340)="2b14e4b38e292fe5b619761709f62d518cb89b6d07ebc1ed1d6eafce0a4cebd0d8fac3314d2344647debb962f2ae118e61cc3c0b7626dd6b1d9946fb2577259a1a1ca54d9d8f25c44c9316c425701cafbb05437d07247e755414c8a854df221d19788b5951d29796487750c5b2bfdf527d089c7a675eb956d9ec9f8231bbca47fe6a7048507182d633a6717e6d3571e19019bfa01beb43c45960592bdbd6c8664b704c845e2506953a99c584d9e7ac75d30ee9bad2d7a5318464151bd4611786641bd8b2006c7ed5b03e7f810dbdbeb85c71376299c7fcff7a5168c9bd022bb634ba8f6fc97d88d51ab261b92b41b96f"}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f00000014c0)={0x0, 0x0, 0x103, 0x4, {0x9, 0x82, 0x6, 0x6}}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000001540)={0x7, &(0x7f0000001500)=[{0x1, 0x34, 0x10000, 0x101}, {0x0, 0x4, 0x5d3f, 0x6}, {0xf114, 0x7fff, 0x5, 0x8}, {0x401, 0x8, 0x3, 0x7}, {0xfffffffffffff001, 0x29, 0xcff1, 0x8}, {0x800, 0x8, 0x6, 0x5}, {0x0, 0x7fffffff, 0x1f, 0xffffffffffffffff}]}, 0x10) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000001580)={0x0, 0x180000000000000, 0x6, 0x0, 0x0, [{r0, 0x0, 0x1000}, {r1, 0x0, 0x200}, {r1, 0x0, 0x7}, {r1, 0x0, 0x6f}, {r0, 0x0, 0x7f}, {r1, 0x0, 0x81}]}) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000001680)={0x40}, 0x10) ioctl$TCSBRKP(r0, 0x5425, 0x6) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f00000016c0)=""/112) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000001740), 0x2) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000001780)=@gcm_256={{0x304}, "262178bca56137cc", "22c623841795a3b2e8c3106b126144b5b13ded68b68363a5371b2bda00b17ea7", "fa5b10de", "8bf9dce9278c7ff5"}, 0x38) clock_gettime(0x0, &(0x7f00000017c0)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000001800)={{}, {r4, r5+10000000}}, &(0x7f0000001840)) connect$netlink(r0, &(0x7f0000001880)=@unspec, 0xc) accept4$inet6(r0, &(0x7f00000018c0), &(0x7f0000001900)=0x1c, 0x800) write$P9_RREAD(r1, &(0x7f0000001940)={0xb, 0x75, 0x1}, 0xb) syslog(0x9, &(0x7f0000001980)=""/4096, 0x1000) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000002980)=0x87) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000029c0)=0x20, 0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000002a00)=0x0) process_vm_writev(r6, &(0x7f0000002d00)=[{&(0x7f0000002a40)=""/10, 0xa}, {&(0x7f0000002a80)=""/156, 0x9c}, {&(0x7f0000002b40)=""/164, 0xa4}, {&(0x7f0000002c00)=""/2, 0x2}, {&(0x7f0000002c40)=""/191, 0xbf}], 0x5, &(0x7f0000005040)=[{&(0x7f0000002d80)=""/236, 0xec}, {&(0x7f0000002e80)=""/29, 0x1d}, {&(0x7f0000002ec0)=""/89, 0x59}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/165, 0xa5}, {&(0x7f0000004000)}, {&(0x7f0000004040)=""/4096, 0x1000}], 0x7, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000050c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000005100)=0x7f) [ 148.261290] IPVS: ftp: loaded support on port[0] = 21 [ 148.275653] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.286898] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.296275] device bridge_slave_0 entered promiscuous mode [ 148.331719] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.348085] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.355524] device bridge_slave_1 entered promiscuous mode [ 148.412150] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 148.432288] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 148.470158] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 148.472202] IPVS: ftp: loaded support on port[0] = 21 [ 148.477840] team0: Port device team_slave_0 added [ 148.514839] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 148.523389] team0: Port device team_slave_1 added 20:21:58 executing program 3: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/130, 0x82) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000100)={0x1, 0x0, 0x103, 0x5, {0x363, 0x4, 0x9, 0x9}}) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000140)={'team_slave_1\x00', 0x10000, 0x100000001}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000280)={0x6, &(0x7f0000000240)=[{}, {}, {0x0}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000002c0)={r1, 0xc}) inotify_init() ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000300)={0x1, 0x1000, 0x4, 0xb11}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x80, 0x0) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000380)=0x80) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f00000003c0)=0x9, 0x8) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000400)={0x83a, 0x4}) r4 = getpgrp(0x0) sched_getparam(r4, &(0x7f0000000440)) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000480)={r2, 0x1}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000004c0)={0x1ff, 0x2, 0xffffffff80000001, 0x5, 0x0}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000540)=@assoc_value={r5, 0x5}, &(0x7f0000000580)=0x8) rt_tgsigqueueinfo(r4, r4, 0x40, &(0x7f00000005c0)={0x1b, 0x5, 0x7ff}) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f0000000640)=0x14, 0x4) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000680)=0x4f, &(0x7f00000006c0)=0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000700)={r6, 0xc2, "8fb2caf43b463f54443a6940c52a5e19db09f0d25bc87097c28ab824d3c5b6696897ee7e895b422f20a8132c144b09f0dac72ec6cdc6ef867507dbd3859f81c6aecd66807f43a9f1d39d1938dbf3d6df0a9b5271323859f40fd5bd95f0d0d6e28e224c5e65205b303b76ce3079fa340fb7f0b3bee2573d585bdfa143579c063bbe0073b37f315016a3e64bff568c4a347ae59c5e99867bba7211409761634ccafd4b4152e83a59019105be5f13620262ef4e033c4bfd7532484d130fb50eea8421f1"}, &(0x7f0000000800)=0xca) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000840)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000880)=0x1) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$bt_l2cap_L2CAP_LM(r3, 0x6, 0x3, &(0x7f00000008c0)=0x10, 0x4) lookup_dcookie(0x8, &(0x7f0000000900)=""/161, 0xa1) ioctl$BLKFRASET(r3, 0x1264, &(0x7f00000009c0)) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) [ 148.555724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 148.581840] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 148.593091] chnl_net:caif_netlink_parms(): no params data found [ 148.701788] device hsr_slave_0 entered promiscuous mode 20:21:58 executing program 4: r0 = socket(0xa, 0x1, 0x3) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000000)=""/102, 0x66}, {&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/54, 0x36}, {&(0x7f00000010c0)=""/103, 0x67}], 0x4, &(0x7f0000001180)=""/113, 0x71}, 0x80000001}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001200)}, {&(0x7f0000001240)=""/166, 0xa6}, {&(0x7f0000001300)=""/159, 0x9f}, {&(0x7f00000013c0)=""/243, 0xf3}], 0x4}, 0xfffffffffffffffe}, {{&(0x7f0000001500)=@sco, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001580)=""/11, 0xb}], 0x1, &(0x7f0000001600)=""/91, 0x5b}, 0x6}, {{&(0x7f0000001680)=@x25={0x9, @remote}, 0x80, &(0x7f0000001800)=[{&(0x7f0000001700)=""/167, 0xa7}, {&(0x7f00000017c0)=""/32, 0x20}], 0x2, &(0x7f0000001840)=""/182, 0xb6}, 0x8}, {{&(0x7f0000001900)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000002d80)=[{&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/22, 0x16}, {&(0x7f00000029c0)=""/29, 0x1d}, {&(0x7f0000002a00)=""/198, 0xc6}, {&(0x7f0000002b00)=""/41, 0x29}, {&(0x7f0000002b40)=""/239, 0xef}, {&(0x7f0000002c40)=""/99, 0x63}, {&(0x7f0000002cc0)=""/161, 0xa1}], 0x8, &(0x7f0000002e00)=""/207, 0xcf}, 0x9}, {{&(0x7f0000002f00)=@nfc_llcp, 0x80, &(0x7f0000003340)=[{&(0x7f0000002f80)=""/176, 0xb0}, {&(0x7f0000003040)=""/233, 0xe9}, {&(0x7f0000003140)=""/253, 0xfd}, {&(0x7f0000003240)=""/198, 0xc6}], 0x4, &(0x7f0000003380)=""/202, 0xca}, 0x8}], 0x6, 0x1, &(0x7f0000003600)={0x77359400}) r1 = syz_open_dev$dspn(&(0x7f0000003640)='/dev/dsp#\x00', 0x9, 0x200040) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000003680)) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f00000036c0), &(0x7f0000003700)=0x4) recvfrom(r1, &(0x7f0000003740)=""/113, 0x71, 0x102, &(0x7f00000037c0)=@nl=@unspec, 0x80) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000003840)={0x0, 0x4}) accept$packet(r0, &(0x7f0000003880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000038c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003900)={'ip_vti0\x00', r2}) r4 = geteuid() lstat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003ac0)={{{@in=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000003bc0)=0xe8) r7 = getuid() mount$9p_tcp(&(0x7f0000003940)='127.0.0.1\x00', &(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)='9p\x00', 0x0, &(0x7f0000003c00)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@posixacl='posixacl'}, {@access_client='access=client'}, {@access_uid={'access', 0x3d, r4}}, {@version_9p2000='version=9p2000'}, {@dfltgid={'dfltgid', 0x3d, r5}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0xfff}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r6}}, {@fowner_eq={'fowner', 0x3d, r7}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'em0/}('}}]}}) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000003d40)={0x3, 0x7ff}) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000003d80)=0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000003e80)={0x0, 0xa0, &(0x7f0000003dc0)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e22, 0x0, @mcast1, 0x7f}, @in6={0xa, 0x4e22, 0x6fd1, @loopback, 0x80000000}, @in6={0xa, 0x4e24, 0x2497, @loopback, 0x1}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0x1, @remote, 0x3}]}, &(0x7f0000003ec0)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000003f80)={r8, 0x70, &(0x7f0000003f00)=[@in6={0xa, 0x4e24, 0x1ff, @mcast1, 0x3}, @in6={0xa, 0x4e21, 0x400, @mcast2, 0x8}, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, @in6={0xa, 0x4e21, 0x200, @dev={0xfe, 0x80, [], 0x12}, 0xfa4}]}, &(0x7f0000003fc0)=0x10) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000004000)) r9 = accept4$tipc(r1, &(0x7f0000004040), &(0x7f0000004080)=0x10, 0x80000) setsockopt$TIPC_SRC_DROPPABLE(r9, 0x10f, 0x80, &(0x7f00000040c0)=0x40800000, 0x4) r10 = accept(r1, &(0x7f0000004100)=@rc, &(0x7f0000004180)=0x80) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f00000041c0)=0x44e, 0x4) recvfrom(r9, &(0x7f0000004200)=""/4096, 0x1000, 0x1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000005200)={0x4, 0x5, 0x1f, 0x0, r8}, &(0x7f0000005240)=0x10) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000005280)) r11 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000005380)='/dev/sequencer\x00', 0x40000, 0x0) recvfrom$packet(r11, &(0x7f00000053c0)=""/4096, 0x1000, 0x1, 0x0, 0x0) sendto$llc(r11, &(0x7f00000063c0)="da52e8c400b9364e8083b6b2039dba1c505ee93e685fa34a47e02204c1dac895411460362d79dc146c64f50f4c11cdcc02ab06eae34b8edf41d5f0d0cf04fd12ff2a7240102f2226d2bd211d426e64014652ecf6750e9d1a081c8e69340552752abc73c34c3a41bf102397ffdfb647ec0900fbf29c9448885efc3a4bf1d49490dc03c9d2025a6c800feebf11888f49496099c19162defd2258", 0x99, 0x20000000, &(0x7f0000006480)={0x1a, 0x205, 0x6, 0x7fffffff, 0x10001, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) setsockopt$inet6_mreq(r10, 0x29, 0x1b, &(0x7f00000064c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r3}, 0x14) [ 148.768345] device hsr_slave_1 entered promiscuous mode [ 148.820557] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 148.827711] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 148.885992] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.887676] IPVS: ftp: loaded support on port[0] = 21 [ 148.897692] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.910743] device bridge_slave_0 entered promiscuous mode [ 148.932700] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.935136] IPVS: ftp: loaded support on port[0] = 21 [ 148.939236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.951454] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.957814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.995778] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.006415] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.014200] device bridge_slave_1 entered promiscuous mode 20:21:58 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x26880, 0x0) syncfs(r0) ioctl$TIOCSTI(r0, 0x5412, 0x4) arch_prctl$ARCH_SET_GS(0x1001, 0x8) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000040)=""/171) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000140)={0x1, 0x2, 0xd001, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000200)={0x6, 0x8}) vmsplice(r0, &(0x7f0000000340)=[{&(0x7f0000000240)="d4543ec3dbe27baeed98", 0xa}, {&(0x7f0000000280)="64053477fc1c62c675a251fdfe0547ceb98eef2f5601408963db7a68ad1a310d0c45eca2ae1c238c8e4773cead6e", 0x2e}, {&(0x7f00000002c0)="a3547d02b129f58cc5d801999678a2b15dc2e2b9e8549238d42a0f30a3b567d8ec1a24656c1411b2cb40dff16d03a69b1408ba1fdd722ae12378e0505a1ba8d89ee76b840a59bed95f813fe12e9f2f9c58c0d6cee283ff9f788c19a6b1bf", 0x5e}], 0x3, 0x8) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000380)) bind$llc(r0, &(0x7f00000003c0)={0x1a, 0x335, 0x80, 0x3, 0xfffffffffffffffb, 0x71e15799, @remote}, 0x10) setxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'U+', 0x2}, 0x28, 0x1) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000500)={0x0, 0x2, 0x8, [], &(0x7f00000004c0)=0x80000000}) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000540)) write$P9_RLCREATE(r0, &(0x7f00000005c0)={0x18, 0xf, 0x1, {{0x40, 0x4, 0x1}, 0x39a1}}, 0x18) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000640)={@mcast1, r1}, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xc0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=0x80, 0x0, 0x0, 0x0, &(0x7f0000000780)={0x1, 0x4}, 0x0, 0x0, &(0x7f00000007c0)={0x5, 0x10, 0x7f, 0x4}, &(0x7f0000000800)=0xff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=0x6}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000009c0)={r0, 0x10, &(0x7f0000000980)={&(0x7f0000000680)=""/187, 0xbb, r2}}, 0x10) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000a80)={0x3, 0x0, {0x1, 0x2, 0x6, 0x1, 0x4}}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000c00)=0xe8) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000c40)) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000c80)={0x6, 0x8, 0x208, 0x59d4, 0xa, 0x8, 0x1000, 0x80000000000000, 0x2, 0x6}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000cc0)={0x0, 0x10000, 0x1, 'queue0\x00', 0x6db}) gettid() r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000dc0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000e80)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x80304}, 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x20, r3, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e22}]}, 0x20}}, 0x4000011) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x0) [ 149.145141] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 149.156029] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 149.166806] chnl_net:caif_netlink_parms(): no params data found [ 149.194857] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 149.203591] team0: Port device team_slave_0 added [ 149.219244] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 149.226628] team0: Port device team_slave_1 added [ 149.235882] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 149.248826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.259662] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.277185] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.284739] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 149.308599] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 149.326352] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 149.342891] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 149.351912] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.358730] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.365776] device bridge_slave_0 entered promiscuous mode [ 149.374043] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.381314] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.388507] device bridge_slave_1 entered promiscuous mode [ 149.410911] IPVS: ftp: loaded support on port[0] = 21 [ 149.412962] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 149.459805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.466959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.509733] device hsr_slave_0 entered promiscuous mode [ 149.548365] device hsr_slave_1 entered promiscuous mode [ 149.632722] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 149.641557] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 149.649837] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 149.655930] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.663398] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 149.671190] chnl_net:caif_netlink_parms(): no params data found [ 149.694997] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 149.702749] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 149.722470] chnl_net:caif_netlink_parms(): no params data found [ 149.744389] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 149.752641] team0: Port device team_slave_0 added [ 149.762665] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 149.770198] team0: Port device team_slave_1 added [ 149.793318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 149.805226] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 149.821812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.832092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.840098] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.846881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.861427] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 149.886243] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.893096] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.900676] device bridge_slave_0 entered promiscuous mode [ 149.908567] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.914919] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.922649] device bridge_slave_1 entered promiscuous mode [ 149.941669] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.948384] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.955444] device bridge_slave_0 entered promiscuous mode [ 149.964285] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.971584] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.978822] device bridge_slave_1 entered promiscuous mode [ 149.986302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 150.000791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 150.018350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.026197] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.034001] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.040355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.047308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.056892] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 150.067596] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 150.111137] device hsr_slave_0 entered promiscuous mode [ 150.158264] device hsr_slave_1 entered promiscuous mode [ 150.208863] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 150.222358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.232668] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 150.242553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 150.251403] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 150.261150] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 150.277157] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 150.291417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.299529] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.307478] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.317071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 150.353211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.362571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.379651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 150.386744] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 150.395631] team0: Port device team_slave_0 added [ 150.402082] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 150.409835] team0: Port device team_slave_1 added [ 150.422720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.434074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.444312] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 150.453052] team0: Port device team_slave_0 added [ 150.461537] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 150.470982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 150.478600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 150.494137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.501934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.510548] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 150.518379] team0: Port device team_slave_1 added [ 150.524710] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 150.530880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.549268] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 150.557230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 150.565015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 150.621108] device hsr_slave_0 entered promiscuous mode [ 150.668289] device hsr_slave_1 entered promiscuous mode [ 150.732786] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 150.755451] chnl_net:caif_netlink_parms(): no params data found [ 150.766573] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 150.775297] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 150.813884] device hsr_slave_0 entered promiscuous mode [ 150.898395] device hsr_slave_1 entered promiscuous mode [ 150.938720] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 150.946108] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 150.959013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.975159] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.990901] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 151.001462] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 151.023292] audit: type=1400 audit(1564431720.505:38): avc: denied { associate } for pid=7672 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 151.025799] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 151.069457] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 151.079720] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 151.085837] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.109660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.116815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.143710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 151.157248] audit: type=1400 audit(1564431720.635:39): avc: denied { create } for pid=7695 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 151.177662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.194437] audit: type=1400 audit(1564431720.675:40): avc: denied { write } for pid=7695 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 151.219660] audit: type=1400 audit(1564431720.675:41): avc: denied { read } for pid=7695 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 151.219993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.252751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.254414] Unknown ioctl -1069001120 [ 151.260962] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.270739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.270996] Unknown ioctl -2146941693 [ 151.278633] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.286963] Unknown ioctl 21523 [ 151.287716] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.294471] Unknown ioctl -2146941693 [ 151.298695] device bridge_slave_0 entered promiscuous mode 20:22:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) lseek(r0, 0x1, 0x4) [ 151.313830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.323291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 151.332783] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 151.341742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.352734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.361781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.373113] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.379551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.392841] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.400309] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.407342] device bridge_slave_1 entered promiscuous mode [ 151.431335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.440813] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 151.453240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 20:22:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x40) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x80800) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000000c0)=r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0xfffffde0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000003, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 151.476079] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 151.484541] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 151.503733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 151.512799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.523684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.537208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.544562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.553950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 151.563172] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 151.571317] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 151.585970] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 151.592486] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.599120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 151.610910] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 151.622460] hrtimer: interrupt took 35391 ns [ 151.632155] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 151.638481] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.646540] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 151.655633] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 151.677462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 151.686249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.694181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.728672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 151.736673] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 151.744707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.752847] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.761000] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.767376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.778752] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 151.784870] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.797014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 151.813790] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 151.823894] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 151.832004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.860702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.869206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.876877] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.883288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.890883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.903984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.911929] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.918518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.928525] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.941037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 151.951329] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 151.966207] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 151.974535] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 151.991870] team0: Port device team_slave_0 added [ 151.997777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 152.030829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 152.038993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.047009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.055076] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.061500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.069011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.077040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.085315] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.091749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.099132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.109980] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 152.121284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 152.139619] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 152.148826] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 152.165761] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 152.173111] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 152.187599] team0: Port device team_slave_1 added [ 152.194668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.208747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.216579] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.223001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.236390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 152.245251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.259500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.267212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 152.280568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 152.296992] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 152.308759] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 152.325484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 152.334618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 152.352402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 152.366609] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 152.375063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 152.389402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 152.397472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 152.411789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 152.416853] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 152.419908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.442315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 152.450807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 152.460829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 152.475426] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 152.484544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 152.513384] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 152.523608] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 152.534760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 152.545078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 152.556947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 152.567093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 152.580796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 152.601718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 152.614501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 152.625283] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 152.634895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 152.647149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 152.663351] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 152.672626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 152.683565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 152.693560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 152.705498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 152.715573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 152.729608] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 152.744681] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 152.756464] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 152.774520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.784824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.795416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.806249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.816665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.827066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.849546] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 152.871527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 152.891765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 152.910345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 152.980795] device hsr_slave_0 entered promiscuous mode [ 153.049138] device hsr_slave_1 entered promiscuous mode [ 153.088557] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 153.096089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.109352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.117095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.130543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.141211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.151781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.164354] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 153.175556] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 153.185462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 153.197484] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 153.207126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 153.218762] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 153.224834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 153.253654] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 153.317109] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 153.345543] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 153.365627] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 20:22:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0x0, 0x6, {0x1}}, 0x18) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0xdb6, 0x2, 0x6}}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/sockstat6\x00') read(r2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000200)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) mount$9p_tcp(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x10000, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r3}}, {@access_client='access=client'}, {@cache_loose='cache=loose'}, {@privport='privport'}, {@nodevmap='nodevmap'}, {@fscache='fscache'}, {@access_client='access=client'}], [{@measure='measure'}]}}) [ 153.397063] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 153.412715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 153.472816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 153.515086] 8021q: adding VLAN 0 to HW filter on device batadv0 20:22:03 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000000)=0x4, 0x4) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000180)={0xfffff7ffffffffff, 0x0, 0x0, 0x80}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000100)={r2, 0x2}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 20:22:03 executing program 0: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1b0f0200008048", 0xa, 0x3}], 0x5d, 0x0) [ 153.615543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 153.669624] audit: type=1400 audit(1564431723.135:42): avc: denied { syslog } for pid=7720 comm="syz-executor.2" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 153.672947] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 20:22:03 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x26, 0x27, 0xfffffffffffffff9}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000100)=0x1001) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x8, 0x7fff, 0x8}) ioctl(r1, 0x1000008911, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x300036, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa03000000000086dd60b40900000c000002000002000000000000ffffe0000002ff020000000000004050000000000000880090780009040060b680fa0000000000000000000000000000ffffffffffff0000000000000000001c913918ddfac96d00ffffac14ffbb"], 0x0) [ 153.748859] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 20:22:03 executing program 1: socketpair$unix(0x1, 0x108, 0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'team_slave_1\x00', &(0x7f00000002c0)=@ethtool_gstrings}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000100)=0xe8) 20:22:03 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8800, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x6, 0x240c0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0)={0x40, 0x4, 0x3}, 0x10) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000200)={0x100000001, 0x5}) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x40140) [ 153.795083] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 153.826334] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 153.883585] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 153.900073] 8021q: adding VLAN 0 to HW filter on device team0 20:22:03 executing program 1: r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@bcast, @remote, @rose, @bcast, @remote, @netrom, @bcast, @rose]}, &(0x7f0000000080)=0x48) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000200)={0x7, 0x7b, 0x1}, 0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc058534f, &(0x7f0000000580)={0x0, 0x200000000080, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x1f\xfc\xff\xff\xff\x00\xc0\xff\x00', 0x0, [0x0, 0x0, 0x1f00]}) [ 153.947414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.956239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 20:22:03 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) getresuid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x100000, &(0x7f0000000500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffff278}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x7f}}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@obj_type={'obj_type', 0x3d, 'proc\x00'}}, {@fsname={'fsname', 0x3d, 'cpusetposix_acl_accesseth1'}}, {@dont_hash='dont_hash'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}]}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl(r0, 0x1400008912, &(0x7f0000003300)="11dca50d5e0bcfe47bf070") r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x18000, 0x0) r5 = fcntl$dupfd(r0, 0x406, r4) ioctl$VIDIOC_PREPARE_BUF(r5, 0xc058565d, &(0x7f0000000000)={0x7, 0xa, 0x4, 0x10, {0x0, 0x7530}, {0x4, 0x8, 0xffffffff, 0x7, 0xa843, 0x100, "4368f5b0"}, 0x6162, 0x3, @fd, 0x4}) getdents64(r4, &(0x7f0000000100)=""/168, 0xa8) getdents64(r4, &(0x7f0000000440)=""/186, 0x760) 20:22:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x105802, 0x4) write$9p(r2, &(0x7f0000001400)="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", 0x600) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@initdev, @in6=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, 0x0) sendfile(r2, r3, 0x0, 0x10000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000040)={r4, 0x80000, r2}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) [ 154.010346] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 154.032615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.057104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.069474] audit: type=1800 audit(1564431723.555:43): pid=7765 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16529 res=0 [ 154.073912] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.098493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.180206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 154.204045] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 154.216484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 154.225007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.238717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.246694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.255809] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.262389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.270624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 154.278793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 154.295631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 154.303000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 154.311972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 154.324018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 154.333940] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 154.341921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 154.351223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.368071] audit: type=1800 audit(1564431723.845:44): pid=7772 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16529 res=0 [ 154.400679] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 154.411955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 154.420583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.449663] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 154.456617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.467035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.477502] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 154.483941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 154.497052] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 154.525909] 8021q: adding VLAN 0 to HW filter on device batadv0 20:22:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="14bc420000000056b500002e900800000000080008000100000007e10500ac14341b080003000800e80f0140ca995cdf5ce3ebb2ab3a7bf6b7cc3437576ca3fb89f089044ebd8bc3af1f323fabd63edb72f738ec709790b1514979483b87ea4e7b785a4ddcfd374676392166ce0a47ac9a5aca5c11cdcca7e86d38b10551c8625899"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0xaaaaaaaaaaaace6, 0x0, 0x0, 0xeb) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0xffffffffffffc14e, 0x0, 0x6, 0x3c6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:22:04 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x3f, 0x4) fadvise64(r0, 0x0, 0x0, 0x0) 20:22:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000340)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000240)={0x0, {0x9, 0x1}}) fsetxattr$security_smack_transmute(r1, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x3fe00) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000100)='syz0\x00') getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="01ef06000900ffff52ea0000010006000900"], &(0x7f0000000080)=0x16) ppoll(&(0x7f0000000440)=[{r1, 0x2}, {r1}], 0x2, &(0x7f0000000480)={0x77359400}, &(0x7f00000004c0)={0x100}, 0x8) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000300)) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000180)={0x0, 0x8, {0x55, 0x400, 0x1, {0x1000, 0x5}, {0x10000, 0x8}, @ramp={0x3, 0xfffffffffffffffd, {0xb3a, 0x1, 0x0, 0xcea3}}}, {0x52, 0x3, 0x19, {0xfffffffffffffe00, 0x6}, {0x4, 0x5}, @cond=[{0x7fff, 0x4, 0x541c, 0x1000, 0x7fffffff, 0x5}, {0x1000, 0x1, 0x800, 0x800, 0x8, 0x1}]}}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r2, 0x1ffffffffffff}, &(0x7f0000000280)=0xffffffffffffffb9) 20:22:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cgroup.max.depth\x00', 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80040, 0x0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000000240)=""/241) sendfile(r1, r1, 0x0, 0x10) 20:22:04 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0xfff) fallocate(r1, 0x10, 0x0, 0xf9) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) 20:22:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000540)={0x0, 0x0, @pic={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000180)={0x40, @time={0x77359400}, 0x6, {0x4c1, 0x6}, 0x3, 0x2, 0x80000000}) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000100)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0xfffffffffffffffd, 'syz1\x00', @null, 0x0, 0x2, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000040)={0x1}) [ 154.623588] audit: type=1400 audit(1564431724.105:45): avc: denied { write } for pid=7785 comm="syz-executor.3" name="net" dev="proc" ino=27837 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 20:22:04 executing program 0: r0 = socket$kcm(0x10, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000500fe80000000000000050015000500812fa8001600030063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) [ 154.711484] audit: type=1400 audit(1564431724.105:46): avc: denied { add_name } for pid=7785 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 20:22:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) close(r1) socket$pptp(0x18, 0x1, 0x2) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) dup2(r0, r1) 20:22:04 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000002c0)={'filter\x00', 0x33, "a5621522d28f468fb0fa1ccdf663bcd9aca360cbc15e285ad199432accbc9440aa01ea818cac7908182975f93a85426afa883a"}, &(0x7f0000000340)=0x57) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb4, r1, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf88a}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x3}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xb1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffeffffffff}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6d}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x1}}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0xb4}}, 0x800) syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0xffff, 0x800) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}], 0x1, 0x1) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x4e20, @empty}}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000980)=""/4096) 20:22:04 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x80) recvmmsg(r0, &(0x7f0000002700)=[{{&(0x7f0000002380)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000280)=[{&(0x7f0000002400)=""/249, 0xf9}, {&(0x7f0000000200)=""/49, 0x31}, {&(0x7f0000002500)=""/162, 0xa2}, {&(0x7f00000025c0)=""/99, 0x63}], 0x4, &(0x7f0000002640)=""/189, 0xbd}, 0x800}], 0x1, 0x140, &(0x7f0000002740)={0x0, 0x989680}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000002780)={{0x8, 0x1d42}, {0x4, 0xffff}, 0x80000000, 0x4, 0xd75}) timer_create(0xffffffffffffffff, &(0x7f0000002840)={0x0, 0x12, 0x4, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = gettid() recvmmsg(r1, &(0x7f0000003c00)=[{{0x0, 0xfffffffffffffcef, &(0x7f0000000000)=[{&(0x7f0000000380)=""/4096}, {&(0x7f0000001380)=""/4096}, {&(0x7f00000000c0)=""/119}], 0x0, &(0x7f0000000180)=""/106, 0xffffffffffffff6a}}], 0x400000000000116, 0x0, &(0x7f0000000040)={0x77359400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$cgroup_int(r0, &(0x7f0000002800)=0x5, 0x12) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) dup2(r3, r1) tkill(r2, 0x1004000000013) 20:22:04 executing program 0: r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000000), 0x0) preadv(r0, 0x0, 0x0, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, 0x2) unshare(0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) getdents64(r2, &(0x7f00000000c0)=""/11, 0xeb) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x8000) getsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f00000002c0)=""/181, &(0x7f0000000080)=0xb5) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000140)="29b71786145b8151d5042f3b0cd62b9c2240b1c0820578dfbfc74855105a5fbcd2db66d25e2c00cdf70dcdb7919d30f7be8c5925acd802b6b9aa4fc47771497759a2f503ed3a9c62db4936ec7f4aead079b54c86", 0x54) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x2, 0x8, 0x3, 0x0, 0xfffffffffffffffc, {0x0, @in6={{0xa, 0x4e21, 0x7, @local, 0xfffffffffffffffc}}, 0x3ff, 0x0, 0x40, 0x0, 0xb08f}}, &(0x7f0000000280)=0xb0) 20:22:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) getsockname$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x10000) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0xf}, @rand_addr=0xffffffffffffff81}, 0x8) [ 154.894335] audit: type=1400 audit(1564431724.105:47): avc: denied { create } for pid=7785 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 20:22:04 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101041, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) pipe(&(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$selinux_context(r1, &(0x7f0000000080)='system_u:object_r:audisp_exec_t:s0\x00', 0x23) setsockopt$inet_udp_int(r3, 0x11, 0x200001000000067, &(0x7f0000000280)=0x802, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10000, 0x0) 20:22:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0xa, 0x200000000000005, 0x84) close(r1) socket$pptp(0x18, 0x1, 0x2) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) dup2(r0, r1) 20:22:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000001ac0)={@mcast1, @rand_addr="0f903087adb108be1068215e7247ec13", @loopback, 0x100, 0x0, 0x4130, 0x100, 0x8, 0x100, r1}) r2 = socket$inet6(0xa, 0x80803, 0x7) getsockopt$inet6_int(r2, 0x29, 0xcb, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x800a, 0x9, 0x55fe, 0x401, 0x8a0, 0x800}, &(0x7f0000000080)=0x20) 20:22:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="407ff1000400000000000000100000002509"], 0x1f3}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0xfffffffffffffffd) r1 = memfd_create(&(0x7f0000000340)=']\'\x00', 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x4000, 0x0) r3 = gettid() sendmsg$nl_netfilter(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x410}, 0xc, &(0x7f0000000200)={&(0x7f0000001040)=ANY=[@ANYBLOB="3c110000030f0e00", @ANYRES32=r3, @ANYBLOB="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"], 0x113c}, 0x1, 0x0, 0x0, 0x80}, 0x4) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x1, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0xfffffffffffffe00}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000040)) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='auxv\x00\xa8\\\f> W(\x82\xa2\xa1\xfe\xa1\x9e\x10&\x02_\xab\xd3\n\x85^\x90\xca\xad\x93\xcd\x83\x14/\x1cN_R\xb8o\xc6o\x94\x8e_\xdd\xa9\x9c6\x881\x13\xc4\xbf\x93^|\x14\x10\x14B\xd05\xeaT\xdb\xdd)2\x1d\xd0\'E\xe0\x1e\xb4\x0e\xea') getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000000)={@remote, @loopback, 0x0}, &(0x7f0000000080)=0xc) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x9, 0x0, 0x3b, 0x100, r1, 0x100, [], r5, r4, 0x5, 0x4}, 0x3c) 20:22:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r1 = getpid() r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80200040}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x110, r2, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x317f}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x73}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x86, @empty, 0x4617}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff800}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) r3 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xffffffffffffffff, 0x142) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x100000001, 0x6, 0x7, 0x9, 0x0, 0x4, 0x1, 0x1, 0x9, 0x5, 0x200, 0x1, 0x0, 0xffffffff, 0x5, 0x2, 0x9, 0x101, 0x10001, 0x7fff, 0xfeb5, 0x2, 0x10000, 0x7, 0xff, 0x8, 0x7, 0x81, 0x0, 0x9cf8, 0x3, 0x0, 0x9, 0x100000001, 0x2, 0x2, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000040), 0x3}, 0x4, 0x28f, 0xffff, 0x9, 0x40, 0x8}, r1, 0x9, r3, 0x9) 20:22:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'nr0\x00', r1}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x68, &(0x7f00000000c0)={&(0x7f0000000000)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x2}]}]}, 0x28}}, 0x0) [ 155.608765] audit: type=1400 audit(1564431725.085:48): avc: denied { map } for pid=7844 comm="syz-executor.1" path=2F6D656D66643A5D27202864656C6574656429 dev="tmpfs" ino=28738 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 20:22:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0xee00) r1 = geteuid() pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000040)=""/127) vmsplice(r2, &(0x7f0000002280)=[{&(0x7f00000000c0)='\\', 0x1}], 0x1, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = getpid() sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {r3, r1}}}], 0x20}, 0x0) 20:22:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000040)={0x5, 0x3, 0x100000000, 'queue1\x00', 0x5}) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 20:22:05 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xfffffffffffffe7b, 0x0}}], 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x4110, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x1000000200002, 0x800000, 0x10000000002, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0xfffffffffffffffe, 0x0) tkill(r1, 0x40) ptrace$cont(0x4207, r1, 0x0, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) ioctl(r0, 0x1000408912, &(0x7f0000000100)="11dc513ca9ce0caf3fbc70") r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000001200)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x12) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='attr/exec\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) [ 155.820783] audit: type=1400 audit(1564431725.305:49): avc: denied { name_bind } for pid=7864 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 155.919088] audit: type=1400 audit(1564431725.325:50): avc: denied { node_bind } for pid=7864 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 156.035699] audit: type=1400 audit(1564431725.365:51): avc: denied { name_connect } for pid=7864 comm="syz-executor.1" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 20:22:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x800) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000580)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 20:22:07 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0145401, &(0x7f0000000180)={{0x3, 0x0, 0x1, 0x0, 0xfffd}}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f00000001c0)={0x7df, 0x9, 0x8001, 0x4, 0x9, 0x7}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000140)={0x2}) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000080)={0xaa16, 0x5, 0x2, 0x3, 0x6, 0xffffffffffff8a05}) 20:22:07 executing program 4: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r2, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffff44ba69a14257c1b2d6b86bbf9e479d3f7d7dcd64e91c64e244abd499b9b3a015b1085cfcc235203247f73076e2a5"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0c0583b, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open$cgroup(0x0, r2, 0x1, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000540)={0x7, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x80008, 0x0, 0x10000, 0x4, 0x0, 0x4, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x1f, 0xffff, 0x0, 0x0, 0xca4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, 0x2734c79b, 0x9, 0x1, 0xffffffff, 0x7, 0x0, 0x0, 0x6, 0x2, 0x0, 0x9, 0x4, @perf_config_ext={0x7, 0x7}, 0x0, 0x8, 0x1, 0xf, 0x6, 0x6, 0x7}, r3, 0x10, r0, 0x0) openat$cgroup_ro(r1, 0x0, 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000440), 0x0}, 0x18) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x8, 0x0, 0x3ff, 0x1, 0x0, 0x6, 0x1000, 0x3, 0x7, 0x6, 0x0, 0x7, 0xebb, 0x9, 0x7, 0x900000, 0x59, 0x2, 0x7, 0x8, 0x0, 0x401, 0x40, 0x6604, 0x80000001, 0x0, 0x4, 0x9, 0x148, 0x8, 0xfffffffffffffebf, 0x15a, 0x9, 0x0, 0x0, 0x6, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0xffffffffffffffff, 0x4338, 0x2, 0x9, 0x3, 0x3a}, 0xffffffffffffffff, 0x2, r4, 0xe) socket$kcm(0xa, 0x0, 0x11) 20:22:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000040)={0x5, 0x3, 0x100000000, 'queue1\x00', 0x5}) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 20:22:07 executing program 0: r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000000), 0x0) preadv(r0, 0x0, 0x0, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, 0x2) unshare(0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net\x00\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) getdents64(r2, &(0x7f00000000c0)=""/11, 0xeb) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x8000) getsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f00000002c0)=""/181, &(0x7f0000000080)=0xb5) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000140)="29b71786145b8151d5042f3b0cd62b9c2240b1c0820578dfbfc74855105a5fbcd2db66d25e2c00cdf70dcdb7919d30f7be8c5925acd802b6b9aa4fc47771497759a2f503ed3a9c62db4936ec7f4aead079b54c86", 0x54) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x2, 0x8, 0x3, 0x0, 0xfffffffffffffffc, {0x0, @in6={{0xa, 0x4e21, 0x7, @local, 0xfffffffffffffffc}}, 0x3ff, 0x0, 0x40, 0x0, 0xb08f}}, &(0x7f0000000280)=0xb0) 20:22:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000040)={0x5, 0x3, 0x100000000, 'queue1\x00', 0x5}) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 20:22:07 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10000, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="390000001400010000002c000500018701546eab0004000000000000b33d5df5000000007e84423e5a0000008000"/57, 0x39}], 0x1}, 0x0) 20:22:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={0x0}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x35, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x22) 20:22:07 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 20:22:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f000045c000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) 20:22:08 executing program 4: r0 = memfd_create(&(0x7f0000000300)='\x00', 0x0) fadvise64(r0, 0x0, 0x0, 0x5) 20:22:08 executing program 3: mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file1\x00', 0x0) mkdirat(r0, &(0x7f0000000440)='./file1/file0\x00', 0x0) renameat2(r0, &(0x7f0000000000)='./file1/file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) 20:22:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000040)={0x5, 0x3, 0x100000000, 'queue1\x00', 0x5}) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 20:22:08 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) 20:22:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304}, "9645e89650196a1a", "45b6e022dbf1fb07ff029bb594c2dcd09a59ebdbe2da06595dfd2797fa4d91bc", "b2d2c111", "b2134e61152bd8a8"}, 0x38) sendto$inet6(r1, &(0x7f0000000180)="8e", 0x1, 0x0, 0x0, 0x0) 20:22:08 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 20:22:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) getegid() lstat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x2, 0x0, 0x6, 0xb9c}) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0xfba5f45842d7e333}, 0x10) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0xb, 0xf, 0x0, "66821220275eee678afb50622f632c972901b18e8140060e4ddd5d350e99eb4c7eca6e9f0dcddb1418a3056c302cd35630f079811b5f2855bdcfcc49819f16d9", "ab13fede93410a1f2fc7b89e7a7d619abfcde097b08c3d6c5d00a7cd51b55edcb63d4bd33dc01b7325b3b92ce16ef7e2171ce5376814d9e15edbaecfe7480ae7", "d9b023b1e59db5e0e3bb36eac7f2dd3f3ef296677f38ba3dbc97d16742aca1fc", [0xf, 0x14d2]}) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000000c0), 0xd91bed2d5012384e) 20:22:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) 20:22:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(0x0, &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x2, 0x0, 0x6, 0xb9c}) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0xfba5f45842d7e333}, 0x10) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0xb, 0xf, 0x0, "66821220275eee678afb50622f632c972901b18e8140060e4ddd5d350e99eb4c7eca6e9f0dcddb1418a3056c302cd35630f079811b5f2855bdcfcc49819f16d9", "ab13fede93410a1f2fc7b89e7a7d619abfcde097b08c3d6c5d00a7cd51b55edcb63d4bd33dc01b7325b3b92ce16ef7e2171ce5376814d9e15edbaecfe7480ae7", "d9b023b1e59db5e0e3bb36eac7f2dd3f3ef296677f38ba3dbc97d16742aca1fc", [0xf, 0x14d2]}) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:09 executing program 4: clock_gettime(0xffffffffffffffba, 0x0) 20:22:09 executing program 1: add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='\n', 0x1, 0xfffffffffffffffd) 20:22:09 executing program 3: clock_gettime(0x9, 0x0) 20:22:09 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) keyctl$clear(0x7, r0) 20:22:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000004c0)) [ 159.802786] kauditd_printk_skb: 2 callbacks suppressed [ 159.802801] audit: type=1400 audit(1564431729.285:54): avc: denied { setopt } for pid=7958 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:22:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x30) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in, 0x0, 0x0, 0x0, 0x4}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) 20:22:09 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) getegid() lstat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r1, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0xfba5f45842d7e333}, 0x10) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:09 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RLERROR(r0, &(0x7f0000000080)={0xc, 0x7, 0x0, {0x3, 'syz'}}, 0xc) 20:22:09 executing program 0: prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/59) 20:22:09 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0}) write$evdev(r0, &(0x7f0000000180)=[{{}, 0x0, 0x5, 0x8}, {{0x77359400}, 0x17, 0xe418, 0x5}, {{r1}, 0x0, 0x7, 0x3}, {{0x0, 0x7530}, 0x3, 0x0, 0x8}], 0x60) finit_module(r0, &(0x7f00000005c0)='}\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=[@register_looper], 0x0, 0x0, 0x0}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r3 = accept(r2, &(0x7f0000000840)=@can, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in=@initdev}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) geteuid() r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) socket(0x0, 0x0, 0x0) 20:22:09 executing program 1: gettid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0x9f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 160.270657] ptrace attach of "/root/syz-executor.1"[7993] was attempted by "/root/syz-executor.1"[7994] 20:22:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(0x0, &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x2, 0x0, 0x6, 0xb9c}) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0xfba5f45842d7e333}, 0x10) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0xb, 0xf, 0x0, "66821220275eee678afb50622f632c972901b18e8140060e4ddd5d350e99eb4c7eca6e9f0dcddb1418a3056c302cd35630f079811b5f2855bdcfcc49819f16d9", "ab13fede93410a1f2fc7b89e7a7d619abfcde097b08c3d6c5d00a7cd51b55edcb63d4bd33dc01b7325b3b92ce16ef7e2171ce5376814d9e15edbaecfe7480ae7", "d9b023b1e59db5e0e3bb36eac7f2dd3f3ef296677f38ba3dbc97d16742aca1fc", [0xf, 0x14d2]}) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept(r0, &(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x0) 20:22:10 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000280)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, &(0x7f0000000180)={0x1b7, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00'}) 20:22:10 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) getegid() lstat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r1, &(0x7f0000f50f90)=[{0x0}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0xfba5f45842d7e333}, 0x10) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:10 executing program 1: clone(0x800083102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) link(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='./file1\x00') lgetxattr(0x0, 0x0, 0x0, 0x0) 20:22:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) getegid() lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0xfba5f45842d7e333}, 0x10) quotactl(0x0, 0x0, 0x0, 0x0) 20:22:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0}) write$evdev(r0, &(0x7f0000000180)=[{{}, 0x0, 0x5, 0x8}, {{0x77359400}, 0x17, 0xe418, 0x5}, {{r1}, 0x0, 0x7, 0x3}, {{0x0, 0x7530}, 0x3, 0x0, 0x8}], 0x60) finit_module(r0, &(0x7f00000005c0)='}\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=[@register_looper], 0x0, 0x0, 0x0}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r3 = accept(r2, &(0x7f0000000840)=@can, &(0x7f0000000300)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in=@initdev}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000009c0)=0xe8) r4 = geteuid() getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r4}, {0x1, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0xa7, 0x0, 0x4}, {0x0, 0x8, 0x9, 0x2}, 0x0, 0x6e6bbf, 0x2, 0x1, 0x1}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0x0, @in6=@mcast2, 0x0, 0x3, 0x0, 0x0, 0x7, 0x7bc, 0xb5}}, 0xe8) fcntl$getown(0xffffffffffffffff, 0x9) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) socket(0x0, 0x800000003, 0x0) 20:22:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) write(0xffffffffffffffff, 0x0, 0x0) getegid() lstat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(0x0, &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x2, 0x0, 0x6, 0xb9c}) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0xfba5f45842d7e333}, 0x10) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0xb, 0xf, 0x0, "66821220275eee678afb50622f632c972901b18e8140060e4ddd5d350e99eb4c7eca6e9f0dcddb1418a3056c302cd35630f079811b5f2855bdcfcc49819f16d9", "ab13fede93410a1f2fc7b89e7a7d619abfcde097b08c3d6c5d00a7cd51b55edcb63d4bd33dc01b7325b3b92ce16ef7e2171ce5376814d9e15edbaecfe7480ae7", "d9b023b1e59db5e0e3bb36eac7f2dd3f3ef296677f38ba3dbc97d16742aca1fc", [0xf, 0x14d2]}) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:10 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) write(0xffffffffffffffff, 0x0, 0x0) getegid() lstat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x2, 0x0, 0x6, 0xb9c}) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0}, 0x10) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0xb, 0x0, 0x0, "66821220275eee678afb50622f632c972901b18e8140060e4ddd5d350e99eb4c7eca6e9f0dcddb1418a3056c302cd35630f079811b5f2855bdcfcc49819f16d9", "ab13fede93410a1f2fc7b89e7a7d619abfcde097b08c3d6c5d00a7cd51b55edcb63d4bd33dc01b7325b3b92ce16ef7e2171ce5376814d9e15edbaecfe7480ae7", "d9b023b1e59db5e0e3bb36eac7f2dd3f3ef296677f38ba3dbc97d16742aca1fc", [0xf, 0x14d2]}) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(0x0, &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x2, 0x0, 0x6, 0xb9c}) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0xfba5f45842d7e333}, 0x10) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0xb, 0xf, 0x0, "66821220275eee678afb50622f632c972901b18e8140060e4ddd5d350e99eb4c7eca6e9f0dcddb1418a3056c302cd35630f079811b5f2855bdcfcc49819f16d9", "ab13fede93410a1f2fc7b89e7a7d619abfcde097b08c3d6c5d00a7cd51b55edcb63d4bd33dc01b7325b3b92ce16ef7e2171ce5376814d9e15edbaecfe7480ae7", "d9b023b1e59db5e0e3bb36eac7f2dd3f3ef296677f38ba3dbc97d16742aca1fc", [0xf, 0x14d2]}) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:10 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) write(0xffffffffffffffff, 0x0, 0x0) getegid() lstat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) socket$inet6_udp(0xa, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:11 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000180)=[{{}, 0x0, 0x5, 0x8}, {{0x77359400}, 0x17, 0xe418, 0x5}, {{}, 0x0, 0x7}, {{0x0, 0x7530}, 0x3, 0x0, 0x8}], 0x60) finit_module(0xffffffffffffffff, &(0x7f00000005c0)='}\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = accept(r0, 0x0, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@remote, @in=@initdev}}, {{@in=@multicast2}, 0x0, @in=@local}}, 0x0) geteuid() getpeername$packet(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) socket(0x0, 0x800000003, 0x0) 20:22:11 executing program 5: r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="2ce60f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340)}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) select(0x40, &(0x7f0000000000)={0x7}, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x5e}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:22:11 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) 20:22:11 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) write(0xffffffffffffffff, 0x0, 0x0) getegid() lstat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x2, 0x0, 0x6, 0xb9c}) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0}, 0x10) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0xb, 0x0, 0x0, "66821220275eee678afb50622f632c972901b18e8140060e4ddd5d350e99eb4c7eca6e9f0dcddb1418a3056c302cd35630f079811b5f2855bdcfcc49819f16d9", "ab13fede93410a1f2fc7b89e7a7d619abfcde097b08c3d6c5d00a7cd51b55edcb63d4bd33dc01b7325b3b92ce16ef7e2171ce5376814d9e15edbaecfe7480ae7", "d9b023b1e59db5e0e3bb36eac7f2dd3f3ef296677f38ba3dbc97d16742aca1fc", [0xf, 0x14d2]}) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:22:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) io_setup(0x80a, &(0x7f00000001c0)=0x0) io_cancel(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_submit(r2, 0x2, &(0x7f0000000340)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0x0, 0x46f5}, 0x0]) 20:22:11 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) [ 162.250891] syz-executor.1 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 162.275842] syz-executor.1 cpuset=syz1 mems_allowed=0-1 20:22:11 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000a80)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 162.303503] CPU: 0 PID: 8098 Comm: syz-executor.1 Not tainted 4.19.62 #36 [ 162.310677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.320055] Call Trace: [ 162.322667] dump_stack+0x172/0x1f0 [ 162.326838] dump_header+0x15e/0xa55 [ 162.330662] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 162.335868] ? ___ratelimit+0x60/0x595 [ 162.339771] ? do_raw_spin_unlock+0x57/0x270 [ 162.344199] oom_kill_process.cold+0x10/0x6ef [ 162.348726] ? task_will_free_mem+0x139/0x6e0 [ 162.353241] out_of_memory+0x936/0x12d0 [ 162.357342] ? oom_killer_disable+0x280/0x280 [ 162.361853] ? cgroup_file_notify+0x140/0x1b0 [ 162.366386] mem_cgroup_out_of_memory+0x1d2/0x240 [ 162.371248] ? memcg_event_wake+0x230/0x230 [ 162.375623] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 162.380745] ? cgroup_file_notify+0x140/0x1b0 [ 162.385261] memory_max_write+0x169/0x300 [ 162.389437] ? mem_cgroup_write+0x360/0x360 [ 162.393767] ? lock_acquire+0x16f/0x3f0 [ 162.397751] ? kernfs_fop_write+0x227/0x480 [ 162.402099] cgroup_file_write+0x241/0x790 [ 162.406353] ? mem_cgroup_write+0x360/0x360 [ 162.410688] ? kill_css+0x380/0x380 [ 162.414351] ? kill_css+0x380/0x380 [ 162.417988] kernfs_fop_write+0x2b8/0x480 [ 162.422159] __vfs_write+0x114/0x810 [ 162.425882] ? kernfs_fop_open+0xd80/0xd80 [ 162.430122] ? kernel_read+0x120/0x120 [ 162.434035] ? __lock_is_held+0xb6/0x140 [ 162.438122] ? rcu_read_lock_sched_held+0x110/0x130 [ 162.443148] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 162.447917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 162.453475] ? __sb_start_write+0x1a9/0x360 [ 162.457811] vfs_write+0x20c/0x560 [ 162.461381] ksys_write+0x14f/0x2d0 [ 162.465025] ? __ia32_sys_read+0xb0/0xb0 [ 162.469106] ? do_syscall_64+0x26/0x620 [ 162.473094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 162.478469] ? do_syscall_64+0x26/0x620 [ 162.482461] __x64_sys_write+0x73/0xb0 [ 162.486372] do_syscall_64+0xfd/0x620 [ 162.490187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 162.495385] RIP: 0033:0x459829 [ 162.498585] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 162.517500] RSP: 002b:00007f87955afc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 162.525230] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 162.532513] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 162.539796] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 162.547081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f87955b06d4 20:22:12 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0x0) [ 162.554358] R13: 00000000004c98cc R14: 00000000004e0e38 R15: 00000000ffffffff [ 162.622253] Task in /syz1 killed as a result of limit of /syz1 [ 162.652132] memory: usage 11664kB, limit 0kB, failcnt 0 [ 162.657712] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 162.665345] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 162.678336] Memory cgroup stats for /syz1: cache:68KB rss:8584KB rss_huge:8192KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:8596KB inactive_file:0KB active_file:4KB unevictable:0KB [ 162.757059] Memory cgroup out of memory: Kill process 8097 (syz-executor.1) score 9787000 or sacrifice child [ 162.769204] Killed process 8097 (syz-executor.1) total-vm:72580kB, anon-rss:4200kB, file-rss:34816kB, shmem-rss:0kB [ 162.782490] oom_reaper: reaped process 8097 (syz-executor.1), now anon-rss:0kB, file-rss:34848kB, shmem-rss:0kB 20:22:12 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) 20:22:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8b9, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x0, 0xb71, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x401, 0x7, 0xffff, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x5, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fa, 0x8, 0x0, 0xffffffffffffff69, 0x0, 0x8d, 0x3, 0x0, 0x6]}, 0x45c) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 20:22:12 executing program 0: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@v2={0x0, 0x0, 0x0, 0x4, 0x11, "6f178d5016de03f7bf4a35c08b17a28252"}, 0x1b, 0x1) 20:22:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) 20:22:12 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) getresgid(0x0, 0x0, &(0x7f0000000040)=0x0) fchown(0xffffffffffffffff, 0x0, r2) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:22:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r3, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='threaded\x00', 0xfffffffffffffdfb) write$cgroup_int(r5, 0x0, 0x0) 20:22:12 executing program 3: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) 20:22:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x2216) pwrite64(r1, &(0x7f0000000400)="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", 0x200, 0x0) 20:22:12 executing program 3: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) 20:22:12 executing program 5: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r2, r1, r1}, &(0x7f0000000140)=""/112, 0x70, 0x0) 20:22:13 executing program 3: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) 20:22:13 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) getresgid(0x0, 0x0, &(0x7f0000000040)=0x0) fchown(0xffffffffffffffff, 0x0, r2) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:22:13 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x401, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) link(&(0x7f00000001c0)='./file0\x00', 0x0) getpid() ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000380)=@buf={0x3a, &(0x7f0000000240)="a68035b03f70e946e011e2c83699db8ffdf7f32ea07c8faa83e10d39363ad60d02df39c35d25724d6f890c52f0b99d01cab5a5f8a6832eda413e"}) openat$uinput(0xffffffffffffff9c, 0x0, 0x4, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) perf_event_open(&(0x7f00000002c0)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x06\x00\xd6\x01\x00', 0x10) r3 = dup2(r2, r2) sendmsg$alg(r3, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ce", 0x2}], 0x1}, 0x8005) write$P9_RATTACH(r3, 0x0, 0x0) socket(0x9, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xffffff45, 0x0, 0x0, 0xfffffffffffffdb9) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000001140)="720442659f20b147182a85a8264e2c5b3146a6b19c8be08be0c4d79ced3dfda4d19ec37b514979ce89550e4353220630d3a572e17ab680fbfc54f1433e2760b7ec8c0868973859adcb5db4334b3790a30289b81443e8833c3f82eeea8c2d5e52b5100ee281d28501e262acedc10a1288a03075e3c426f257d7bfbd4de670d5503512e4921bd554e9fb43cf133536489f5928bd0506b8b7f1346efe441ad891f73f7e0b55b18aa4e84bb613d1b388c2fb0e0383502931c2220048450845c72d380d4f9e8df5255d2cbf120a0fae6a3258189449c0948b61bd1a7a71482d5d4c1f127fa0e5b923a995d354e3bb805bccea28be46c58cd104b938b7d03314afce2d747fcd8e5c61b0f18d5dd66d1e6f3762a049acde669f9326c59e6ba80f63d70d8115842101fec66f7c99cd939bb3c6255e58701f9fa45e54dd28d991d3b10cbc9258d95326382458b4bdd2336f06beb34316532a2d5e1518d2a1c21736c0dea1716d446961e33583a10e1561563d1b87b4c295fa0aced358b9ea934c4ae29832fedd1eb4c850a50c026d6a11d81a0db018a058d31d09676f44e29d8084fd78acf2906ab35acc93725fff32954c3165d258b3c2c541969dc65761d54cfc950582190aac611e6eeb8d7a18f71543e3280b92f311a51cb6f3153b55b4acc594d4af85ca211dc645c686baa242683a0135704e174aa9849663a046df2d04a488c3ccf8dbd98d8c40cca16657303e1152564e6324bf3d78a242c2d355947049ae6d2e55cfe9286d10227534ffd4a57e1c66b6464572a9934e6e4f7bcf8987309d7d7bca57fff44e79e59c9b12eb8dfccf0307da88fe0970dd697180fdf9aa2b1ca931b7867cf24bdea52e435749e866621c10e8181fe1f5426e164879aa039f53e2ec25783ee644839c5dadc82ee76f50136cd770bf996a494ca260f4b1a83839d1f93d2108ef0b76b632cdf816e8b814a07b36aaa5ad9cde08d3f44deabec3ab841ae266954497c7987f28034e97560e1da6b28eed718710c6c34c3766dd8518345e1e76862d7a70a0ef580a68e9e20e332ed842d028d57d37faf5b9e65d40cbf974ee596dfc33287eae575ab0e08d6683d2cf7b2b02be4e63cde9ab6075053f8a649e01b1b463d5cf02d4dd6543da7b0786c39e907db3cfce3cefa5470103cb3c7936e62b2bcc3ce441a45f8b09e2fc87a53a101c8cc552331e536b46ff3dcbfd7786a7175b6a21cff6cf576b171a637e4a7a6364e291de056bccaeff584c3d709e256c3a20e0bbb1ebaf150c46b6667840459597dd8aa2d77a86875901997b0da5c5b1c4e5d28fa10060332721aff7ec1510904c364e218f89d38f104ca997b612e97b140791d261aae109af40fcdf3339dc7761a0126b1f516abc50987aef411c84d143b5c12c1dc931b6483ef892c94cfe7649a336e1e0e4d2f68bede65bba26bf43f62af469ef96fa274e338fa69e5127b11eae92d1efd6102ca6ad7692e89ddc7cdc4a71aadcdde5e1c0a3592e4b1c57afa6ce6b56eb0b57888a2ad7af2b8c51e4bb57c37a5589df320e8202383b8a918190afc22fdd2b20d1632f92a6c97f81139ea8cc92f4997684a95851931a609c46e58ffeade3a34c64c8b4c68791d319648cd2f3b454396aa0547e75b3f4b6e49716cd6f4e0a2cbb399c3de333e243974489e656703f738d711456d19c82e82ec4ba34c33b0022fe59de533d5828a49b8c839715f44fd2e01d7876afc6a79f2a085d094900e8aa238c0c4f94decc58b11a5ea524afc9cd1998a3c0e98d5c188c436aadff0dcf7dbde25f8178ca8c076e0766551aed14addce8df440287d7f1d164f19308fd3de4e4e5e611df14c080b7bdf5b6762b5017da5ec3fcbc94399a2bc9ed635a386e28144bbf45bc8e8c6993dedd213e0b464316c0726d380bdd04cf210d91d4fa754a42c5904e4efcad2ae4fe7dc3d841de3485d1b2f095167899faac165df72f5fde45d6faaf97dbf7b8624dfb4865ceafb781b1a7a230cd0e5572aae140a1c1f144deb2a2574ab12c2a9d0fc3e30a548faf8c47427f3a6ad81c54b4d04f398a8e93dfd3705221ce13098f451f25569232d07a6971f8b6bca2a308006f14761a5f1c80e075c4b41f64cd0b64283dc4faec97c030d2c2b50d1f11ee49f8e948fc294f54739a3c3bf63321ca50293c3ca00e2fb1e5030e7965e09c97ba3db576a976e83cec3588dcb999c06ce56b82656aa81eee9425e2f1124d9df8195e0822957cbad32af73decfdb0bd6c6e7faf9078019fde5d8ab7d886da8be0dd8213031ff0183aa2ae59c8f3319d47c64b01fbc4906f7291f920f5ec4dd5db03ad1094c717ee612b7e28837db35515d6f68808d30d45bf057a54dde2f84f67091b669e50d907400bdc7f525c5a5f392d01a5baf74bd077ec34a590863bbeab2dbf8613e77fb080ef76d52603ea5930f25c9de22d230417882cc1e63b2faf5075d41ed239367e35421e37804890bc0794d262c9ca53cabcd55fea78a9d648652232988cce27a7d05d6eb5f59750b656782f4e59876fb7c169c96bd9bede61e58585ec783dc30c898f384166a2097b291a5153a9c67b5705b563e54f8358c4c8caeeb5834e14ccaafae3bac1bd6afeb856be82b7eb62955376eae1cb48163c01d61c7ebd60f5bf823edf0382648d499246329c0117cccc0019e6b0e1a0e50201385953ff38a9755558a3d834b56d0593d1b9233be5def24d25283bbcbc18df1f033a51c176fb21917e4b37e26a4c8b2e452a5a72e494efc7b378158b2f60298146bfd69f2f418d96083b83a13db01fbc29f197c7f11c048132e00bec9e9ce406475053cd420b69db1138c39ddef392fd4bbd3aec82f1b730dce44f048e9d0266e9d47424bb0f317c5f2da99ca5d4745729053cec1c7eb3ee13dca820ceb4a56b26c868d8e81a4e8b31bbeb3aecc86ea705aadb7fab0e3d76fa87effd0945127b992fc86d09e2fc387b791805b3516429f107b2af6fe6d4fc7dbd99c7e0ce5947b03f077ee13ab709eeb326d8fe69e08c2a13581fcc8fa6a5864c586862012503d0fba946780009b936a2c2697b6052e76dbbbfbda75797097b3b94ea8153651ef1d9dbb9b7a0b21d456314386c7a844e9eb3cacac316da7f1b3623bdbdf52c68b0592d7962fdcf91760c4108bccda8f0cc48ba9b309fb31e8f28306fee128b226a39865fdfe07d30005b64899ff4b2bbfdcf5827da87ca6e556515a6952e5b9b19b25c8ac58931c20c5c36ab5feed630678e8e6b6f8b871eb104bd2fd76380a217af18246bccfea365e902ac0a28e598c7c4aa95fcec32d7b7f3a2276a9c18e37b237d14b529437f953107378dc54da64efbf993c0d39fd29866f1c2dbfcb6865b899481d616b7316a33b331189724d177ff998fee99fb20d3598ce5b6604f6512168b96e2d81936dec8b3fa71de2b405523a570c2d006be1d1cf146c23f281cd6223e0dd2730292ed35fc5155800bbcdd7391c71c4df32807272e5c4ea97b5b6a1d702bbf8298185e1eb8884b0687739b4d5a45462ffee87826ede2eebfcfe0492047f244a5f40cc2675ce6ddf4a55cdc8d756b3ed12ea2583b1721a27f13b6f54f91cf22fc1849ba8d487ff2205ca1c67425411fb551e43b21e7660c886f1def3d2dbeadfd218f5a35a5fbe0f71fa993ae760a40704e318371d5a148ef2f2ce81b91eca066c8440f7b91801bfc9963a1b60f00066c592064e43696d4902b367bc220b4a2f250feff410296965054df8b9876b0ff8a05ca0e135382e5bd024b99dfd881a93d242ddcbe9479ad25075510ed9637a41f4f13bdcdc5bc408359c4701e90ae52bf0981383521a5972669192488d2adf3a76f7f4f86fcdc20aec8bcfce4f27302d356e1dc2eff2dc52f36a66ec33c3cba66281f65b7871b89700a576f4594d3464fe9348b3a90684240a73c9c08deee49dbae6f475651de3a43129735b8472c0bf0ee74056c74849b27cdb169c01954e5fd7b347fde4a05751f890dfaf3ed873eee47c7f17d2aa433b4783b66aad85d5e611cb0b78aa5940e6b1a89e31a0e55ebbea04e8ce8fa7595fbaa2cfc41426b746bd41eaa252127ae7797b316fd40d58a382f667c9b8f9584abc093c40a2e8f3f29110203bd71dafa16f26b8ea4bde27cfe2d6ab411bf5eaacb55ca0f4475d56edc14db217ee6fe15c50983798e024b60e79fe445c50553818d2aa8bf69b15182f291a1e82af7fda14eacc5a3b80aa9c4aad8dab203b7157444803fbc9574e10cfef4293b6913b68e159548bdfa591f15d49d06e718b1f9f9b4b1607a14b557a34c0e06517c8152a86b5c7d5fda16b0624b6d9ba543a7a75e4500f00bc77f637aff19f69b34c8c22d178238cfdaebd9d77e16da533866950cfc92245b553934b73cd7bfeedf5f18630394c25cae9c1d02526dde1814718288b3c8f71758864c271a60f88aa4099df5a8b2a07c8d1065678cb58fabf2a514470b185d273b3e608adb1c6b8763019b1ef3c9afd0f2c8db8d61b86b37a9b851d119bf861a05affd52ca2fb1db8ab2084dd9f73ee5a031163b36202456b2ff02faaf29aa39898e08b8ba0703c87c5cd9e3adc3a56be01e5343d3f090e3eac18e4df52e385e1a680933c975e7ed06859dd276901a1e94171e1e302bd0e8cfe2c0dc966aa6355331fe3f65e75ad3add5f27d5378217e0bc30716adce463c722219791285810632870a57d1cbbd22a120c7562602fcd5fd3a8237d1e1f6259b628ef263bdf1fc0c17a640ff9e7b91da54f00616540169ef288084a07162fa7f48a2590b3f31cb3a9ce6f8b1c2b4346af2abc59b4bfeaf5e85923c158f6664fe28a5c4c35a1b6096e2f663e3c1356df6f81a33d118125115c37d4ed2a30ee9b208354f972f3059a94f263ca91270f5dc3dc6bdeca3a2a0285a9abcf319bc99d6004803f706f47f280ba5811055ca4a77d9ae7992633fa87a5e1840e821849e5811e085a34088af99705e7d54d6f44d54c4bba43f60bddd1bfce50760342af8ac64306828409f5e946985fa330c4d4fcfcef886e51ae434379e92e5de492c20d800577fa7fc388b2f5c46faa74eb671346fc36826d7293910db4cb430ac7dc0d9b7950cd665be9249df46802bfb1c5f3851f0a487ab7aeb562b2d7add05859443d44da4b777cf161e46cccc92a6c2df7cd2f00db5889f0be1ebff32664d67f8dc1150f1c58b56c52fc2ff91560c2b9b2dc155bc47fc2af64c6fb97479bd156dd38c0416c5f574688b497ab9259191ed49cb6c38e45a8cdef6c65279a9872a84675fc57a85e3bbfb277482b41deba460a374f5f1b59883828f8e7332379f00bdef8b21ba92f08a7ae6dbe9f45d53a9e8a0f330d44f53117a7874fdbf35bf0d9d06a696d563c67ac28c194fb0371210b4abb5b1096066264090aaa5bc1a5762ff4ed1c9a8af90546dc33f574dede112a87cb2e304434d6718a983a019ea3831a032c2bcb9965f3643a2190f152a179a834677890b9cf18453a967fd77acfbe3ec41f92e870e2de0cd1d546a926238d932693551a11dd9f6dada265d799ad9e23401954b0392378ed193eb43d1fd246f0919a46777f3c26054ffb1fad1724c31c6fdbbb3b97a38f8360ef3b0b912f54ef0c2c4921b6bc75f64900bcd1b2a888c1135eb2477781625c77bddbf043b5ebc9476122460c583931a80b9b198448450a3884838b84cd1f8196485f156f36c0df7b509bff2d3a542a03d6429bb986b3d5bf0d543c8047fadbaca9eb0a6d2a5b5eadacc6483780667a21d27d543caf3abe6b4f4b8a91055") ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f00000003c0)={0x6, 0x3, 0x3e, 0x100}) getsockopt$inet6_int(r3, 0x29, 0xce, &(0x7f0000000280), &(0x7f0000000340)=0x4) 20:22:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) 20:22:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x2216) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) 20:22:13 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) 20:22:13 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) 20:23:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x8e, 0x0, &(0x7f0000000480)="bd841db3b37a4e7f10f9d8d35a3e7854626cf481c0faee5d6f579ae66b0b205006faf145d78114136447c8e22a4a5f10ce97b228dc279e39f4b71f320916828756af1fa6090e0214e3bea3570955647208b65e900b9651532f8cfa3c0a4deb08704bd60c3f1e2d467fb9b17a2a3ace9bbadd7568bd72c116aaf331984aea47c266cde2cc7613d1266b9f53b325c0", 0x0, 0x9}, 0x28) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce1e, 0xfffffffffffffffd, 0x40000000000000, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x2, @perf_config_ext, 0x1024}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000580)=@llc={0x1a, 0x33e, 0x0, 0x101, 0x5, 0x4}, 0x80, 0x0}, 0x40) r4 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000000)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="9cabbf0400cbb140419b80008100254588a8", 0x12}], 0x1}, 0x0) r5 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x40) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r3, 0x7, 0x1, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x310) r6 = socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000640)='threaded\x00', 0xfffffffffffffdfb) write$cgroup_int(r5, 0x0, 0x0) 20:23:12 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x401, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) link(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000380)=@buf={0x3a, &(0x7f0000000240)="a68035b03f70e946e011e2c83699db8ffdf7f32ea07c8faa83e10d39363ad60d02df39c35d25724d6f890c52f0b99d01cab5a5f8a6832eda413e"}) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) perf_event_open(&(0x7f00000002c0)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x06\x00\xd6\x01\x00', 0x10) r2 = dup2(r1, r1) sendmsg$alg(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ce", 0x2}], 0x1}, 0x0) write$P9_RATTACH(r2, 0x0, 0x0) socket(0x9, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xffffff45, 0x0, 0x0, 0xfffffffffffffdb9) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f00000003c0)={0x6, 0x3, 0x3e, 0x100}) getsockopt$inet6_int(r2, 0x29, 0xce, &(0x7f0000000280), &(0x7f0000000340)=0x4) 20:23:12 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x401, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) link(&(0x7f00000001c0)='./file0\x00', 0x0) getpid() ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000380)=@buf={0x3a, &(0x7f0000000240)="a68035b03f70e946e011e2c83699db8ffdf7f32ea07c8faa83e10d39363ad60d02df39c35d25724d6f890c52f0b99d01cab5a5f8a6832eda413e"}) openat$uinput(0xffffffffffffff9c, 0x0, 0x4, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) perf_event_open(&(0x7f00000002c0)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x06\x00\xd6\x01\x00', 0x10) r3 = dup2(r2, r2) sendmsg$alg(r3, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ce", 0x2}], 0x1}, 0x8005) write$P9_RATTACH(r3, 0x0, 0x0) socket(0x9, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xffffff45, 0x0, 0x0, 0xfffffffffffffdb9) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000001140)="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") ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f00000003c0)={0x6, 0x3, 0x3e, 0x100}) getsockopt$inet6_int(r3, 0x29, 0xce, &(0x7f0000000280), &(0x7f0000000340)=0x4) 20:23:12 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) 20:23:12 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)) 20:23:12 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) getresgid(0x0, 0x0, &(0x7f0000000040)=0x0) fchown(0xffffffffffffffff, 0x0, r2) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:12 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:23:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) 20:23:13 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:23:13 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) getresgid(0x0, 0x0, &(0x7f0000000040)=0x0) fchown(0xffffffffffffffff, 0x0, r2) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:13 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000002c0)='threaded\x00', 0xf9a95295) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) fcntl$lock(r4, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r3, 0x400000007, 0x0) fcntl$lock(r4, 0x7, &(0x7f00000000c0)={0x0, 0x0, 0x1b, 0x3e}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f00000000c0)={0x3ff, 0x2, r1, 0x0, r2}) r5 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r5) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) write$P9_RWRITE(r0, 0x0, 0x0) 20:23:13 executing program 3: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x4032, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 225.347462] IPVS: ftp: loaded support on port[0] = 21 [ 225.531747] chnl_net:caif_netlink_parms(): no params data found [ 225.541142] device bridge_slave_1 left promiscuous mode [ 225.547009] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.591621] device bridge_slave_0 left promiscuous mode [ 225.597113] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.739596] device hsr_slave_1 left promiscuous mode [ 228.820896] device hsr_slave_0 left promiscuous mode [ 228.881952] team0 (unregistering): Port device team_slave_1 removed [ 228.892853] team0 (unregistering): Port device team_slave_0 removed [ 228.905311] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 228.972222] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 229.038118] bond0 (unregistering): Released all slaves [ 229.116052] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.122596] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.129672] device bridge_slave_0 entered promiscuous mode [ 229.136784] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.143272] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.150868] device bridge_slave_1 entered promiscuous mode [ 229.170079] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.179564] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.195743] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.203084] team0: Port device team_slave_0 added [ 229.209827] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.217150] team0: Port device team_slave_1 added [ 229.222899] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.230319] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.279888] device hsr_slave_0 entered promiscuous mode [ 229.308383] device hsr_slave_1 entered promiscuous mode [ 229.348547] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 229.355530] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 229.372207] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.378736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.385315] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.391814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.424910] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 229.432624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.469634] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.479379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.487215] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.494501] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.501947] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 229.521075] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 229.527190] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.538487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.546270] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.552677] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.585101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.593747] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.600340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.614813] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.638269] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.645678] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.660014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.667552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.683878] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 229.692587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.716526] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 229.737679] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.871402] syz-executor.1 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 229.883402] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 229.889266] CPU: 0 PID: 8233 Comm: syz-executor.1 Not tainted 4.19.62 #36 [ 229.896296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.905664] Call Trace: [ 229.908271] dump_stack+0x172/0x1f0 [ 229.911910] dump_header+0x15e/0xa55 [ 229.915632] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 229.920745] ? ___ratelimit+0x60/0x595 [ 229.924730] ? do_raw_spin_unlock+0x57/0x270 [ 229.929250] oom_kill_process.cold+0x10/0x6ef [ 229.933840] ? task_will_free_mem+0x139/0x6e0 [ 229.938375] out_of_memory+0x936/0x12d0 [ 229.942363] ? oom_killer_disable+0x280/0x280 [ 229.946861] ? cgroup_file_notify+0x140/0x1b0 [ 229.951373] mem_cgroup_out_of_memory+0x1d2/0x240 [ 229.956829] ? memcg_event_wake+0x230/0x230 [ 229.961246] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 229.966352] ? cgroup_file_notify+0x140/0x1b0 [ 229.970865] memory_max_write+0x169/0x300 [ 229.975023] ? mem_cgroup_write+0x360/0x360 [ 229.979355] ? lock_acquire+0x16f/0x3f0 [ 229.983333] ? kernfs_fop_write+0x227/0x480 [ 229.987664] cgroup_file_write+0x241/0x790 [ 229.991905] ? mem_cgroup_write+0x360/0x360 [ 229.996230] ? kill_css+0x380/0x380 [ 229.999951] ? kill_css+0x380/0x380 [ 230.003612] kernfs_fop_write+0x2b8/0x480 [ 230.007776] __vfs_write+0x114/0x810 [ 230.011500] ? kernfs_fop_open+0xd80/0xd80 [ 230.015738] ? kernel_read+0x120/0x120 [ 230.019896] ? __lock_is_held+0xb6/0x140 [ 230.023970] ? rcu_read_lock_sched_held+0x110/0x130 [ 230.028988] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 230.033750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.039462] ? __sb_start_write+0x1a9/0x360 [ 230.043809] vfs_write+0x20c/0x560 [ 230.047376] ksys_write+0x14f/0x2d0 [ 230.051011] ? __ia32_sys_read+0xb0/0xb0 [ 230.055076] ? do_syscall_64+0x26/0x620 [ 230.059153] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.064516] ? do_syscall_64+0x26/0x620 [ 230.068500] __x64_sys_write+0x73/0xb0 [ 230.072481] do_syscall_64+0xfd/0x620 [ 230.076309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.081498] RIP: 0033:0x459829 [ 230.084713] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.103626] RSP: 002b:00007efc066e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 230.111346] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 230.118794] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 230.126072] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.133342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efc066e26d4 [ 230.140611] R13: 00000000004c98cc R14: 00000000004e0e38 R15: 00000000ffffffff [ 230.151891] Task in /syz1 killed as a result of limit of /syz1 [ 230.158518] memory: usage 6976kB, limit 0kB, failcnt 320452 [ 230.164334] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 230.171594] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 230.178286] Memory cgroup stats for /syz1: cache:68KB rss:4192KB rss_huge:4096KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:4216KB inactive_file:0KB active_file:0KB unevictable:0KB [ 230.199670] Memory cgroup out of memory: Kill process 8232 (syz-executor.1) score 10053000 or sacrifice child [ 230.210191] Killed process 8232 (syz-executor.1) total-vm:72584kB, anon-rss:4232kB, file-rss:35844kB, shmem-rss:0kB [ 230.223490] oom_reaper: reaped process 8232 (syz-executor.1), now anon-rss:0kB, file-rss:34892kB, shmem-rss:0kB 20:23:19 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x10001) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfffffefe) fallocate(r0, 0x3, 0x8000, 0x8000) fallocate(r0, 0x3, 0x0, 0xfff9) 20:23:19 executing program 0: sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000101) setrlimit(0x0, 0x0) 20:23:19 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000280)={0x1, 'syz_tun\x00'}, 0x18) 20:23:19 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) getresgid(0x0, 0x0, &(0x7f0000000040)) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:19 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000002400)=""/4096, 0xc8b7) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 20:23:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x2}, 0x20) [ 230.320318] IPVS: sync thread started: state = MASTER, mcast_ifn = syz_tun, syncid = 0, id = 0 [ 230.321651] syz-executor.1 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=0 [ 230.355694] syz-executor.1 cpuset=syz1 mems_allowed=0-1 [ 230.362112] CPU: 0 PID: 8229 Comm: syz-executor.1 Not tainted 4.19.62 #36 [ 230.369184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.378636] Call Trace: [ 230.381242] dump_stack+0x172/0x1f0 [ 230.384882] dump_header+0x15e/0xa55 [ 230.388603] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 230.393722] ? ___ratelimit+0x60/0x595 [ 230.397619] ? do_raw_spin_unlock+0x57/0x270 [ 230.402045] oom_kill_process.cold+0x10/0x6ef [ 230.406587] ? task_will_free_mem+0x139/0x6e0 [ 230.411104] out_of_memory+0x936/0x12d0 [ 230.415098] ? lock_downgrade+0x810/0x810 [ 230.419261] ? oom_killer_disable+0x280/0x280 [ 230.423766] ? find_held_lock+0x35/0x130 [ 230.427847] mem_cgroup_out_of_memory+0x1d2/0x240 [ 230.432836] ? memcg_event_wake+0x230/0x230 [ 230.437359] ? do_raw_spin_unlock+0x57/0x270 [ 230.441916] ? _raw_spin_unlock+0x2d/0x50 [ 230.446081] try_charge+0x1028/0x15b0 [ 230.449892] ? find_held_lock+0x35/0x130 [ 230.453973] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 230.458839] ? kasan_check_read+0x11/0x20 [ 230.463001] ? get_mem_cgroup_from_mm+0x156/0x320 [ 230.467860] mem_cgroup_try_charge+0x259/0x6b0 [ 230.472471] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 230.477505] wp_page_copy+0x430/0x16a0 [ 230.481496] ? pmd_pfn+0x1d0/0x1d0 [ 230.485043] ? kasan_check_read+0x11/0x20 [ 230.489229] ? do_raw_spin_unlock+0x57/0x270 [ 230.493646] do_wp_page+0x57d/0x10b0 [ 230.497525] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 230.502202] ? kasan_check_write+0x14/0x20 [ 230.506441] ? do_raw_spin_lock+0xc8/0x240 [ 230.510787] __handle_mm_fault+0x2305/0x3f80 [ 230.515293] ? vmf_insert_mixed_mkwrite+0x90/0x90 20:23:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x3, 0x0) 20:23:20 executing program 4: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) [ 230.520162] ? count_memcg_event_mm+0x2b1/0x4d0 [ 230.524943] handle_mm_fault+0x1b5/0x690 [ 230.529033] __do_page_fault+0x62a/0xe90 [ 230.533204] ? vmalloc_fault+0x740/0x740 [ 230.537279] ? trace_hardirqs_off_caller+0x65/0x220 [ 230.542307] ? trace_hardirqs_on_caller+0x6a/0x220 [ 230.542322] ? page_fault+0x8/0x30 [ 230.542340] do_page_fault+0x71/0x57d [ 230.550794] ? page_fault+0x8/0x30 [ 230.550806] page_fault+0x1e/0x30 [ 230.550816] RIP: 0033:0x430906 [ 230.550829] Code: 1f 44 00 00 48 29 e8 31 c9 48 81 fb 40 56 71 00 0f 95 c1 48 8d 34 2a 48 83 cd 01 48 c1 e1 02 48 83 c8 01 48 09 e9 48 89 73 58 <48> 89 4a 08 48 89 46 08 48 8d 4a 10 8b 05 5c 46 64 00 85 c0 0f 84 [ 230.550836] RSP: 002b:00007ffd0d1763d0 EFLAGS: 00010206 [ 230.561706] RAX: 0000000000019691 RBX: 0000000000715640 RCX: 0000000000008041 [ 230.561717] RDX: 000000000133d930 RSI: 0000000001345970 RDI: 0000000000000003 [ 230.583802] RBP: 0000000000008041 R08: 0000000000000001 R09: 000000000133c940 [ 230.583811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000715698 20:23:20 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:20 executing program 4: add_key(&(0x7f00000000c0)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 230.583819] R13: 0000000000715698 R14: 0000000000000000 R15: 0000000000002710 [ 230.727774] Task in /syz1 killed as a result of limit of /syz1 [ 230.761356] memory: usage 2596kB, limit 0kB, failcnt 320460 [ 230.767194] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 20:23:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = eventfd(0x5) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000300)={r3, 0x10, 0x2, r2}) 20:23:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) setpriority(0x0, 0x0, 0xffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x1) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x28880, 0x0) fanotify_mark(r1, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') listen(r0, 0xfff) r2 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[], 0xff42) [ 230.797578] audit: type=1800 audit(1564431800.275:55): pid=8264 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16632 res=0 [ 230.831736] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 230.839359] Memory cgroup stats for /syz1: cache:68KB rss:28KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:40KB inactive_file:0KB active_file:0KB unevictable:0KB [ 230.908027] Memory cgroup out of memory: Kill process 8229 (syz-executor.1) score 8757000 or sacrifice child [ 230.919665] audit: type=1800 audit(1564431800.345:56): pid=8244 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16632 res=0 [ 230.928832] Killed process 8229 (syz-executor.1) total-vm:72452kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB 20:23:20 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000008d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) 20:23:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000040), 0x1c) 20:23:20 executing program 0: sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000101) setrlimit(0x0, 0x0) 20:23:20 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff0300180d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100}, 0x28) 20:23:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000280)=r0, 0x706) 20:23:20 executing program 5: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000006c0)=0x200) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5ed, 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) accept4$packet(r0, 0x0, &(0x7f0000000400), 0x80000) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x1) 20:23:20 executing program 4: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000006c0)=0x200) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5ed, 0x4) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 20:23:20 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x2000, 0x44) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) io_submit(0x0, 0x0, 0x0) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:21 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:21 executing program 0: sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000101) setrlimit(0x0, 0x0) 20:23:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_matches\x00') preadv(r1, 0x0, 0x0, 0x0) 20:23:21 executing program 5: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000006c0)=0x200) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5ed, 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) accept4$packet(r0, 0x0, &(0x7f0000000400), 0x80000) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x1) 20:23:21 executing program 4: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000006c0)=0x200) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5ed, 0x4) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) 20:23:21 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, 0x0, 0x0) 20:23:21 executing program 5: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000006c0)=0x200) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5ed, 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) accept4$packet(r0, 0x0, &(0x7f0000000400), 0x80000) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x1) 20:23:21 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:21 executing program 4: socket$unix(0x1, 0x5, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getpid() ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 20:23:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x1) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) open(0x0, 0x800, 0x91) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0xfff) r1 = accept4(r0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0xff42) 20:23:21 executing program 5: ftruncate(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f00000006c0)=""/148, 0x94}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='limits\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) [ 232.026085] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 232.738763] device bridge_slave_1 left promiscuous mode [ 232.744341] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.791086] device bridge_slave_0 left promiscuous mode [ 232.796636] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.921203] device hsr_slave_1 left promiscuous mode [ 232.972878] device hsr_slave_0 left promiscuous mode [ 233.030940] team0 (unregistering): Port device team_slave_1 removed [ 233.042791] team0 (unregistering): Port device team_slave_0 removed [ 233.052778] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 233.113788] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 233.210611] bond0 (unregistering): Released all slaves [ 233.604330] IPVS: ftp: loaded support on port[0] = 21 [ 233.745785] chnl_net:caif_netlink_parms(): no params data found [ 233.816450] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.824859] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.837307] device bridge_slave_0 entered promiscuous mode [ 233.846046] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.857571] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.866318] device bridge_slave_1 entered promiscuous mode [ 233.901477] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.916077] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.944592] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 233.964250] team0: Port device team_slave_0 added [ 233.974369] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.984340] team0: Port device team_slave_1 added [ 233.993915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 234.003679] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 234.080972] device hsr_slave_0 entered promiscuous mode [ 234.124450] device hsr_slave_1 entered promiscuous mode [ 234.178698] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 234.185887] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 234.202448] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.209000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.215697] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.222102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.263459] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.271643] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.278614] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.288941] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.296978] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.303237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.310438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.320725] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 234.326896] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.339653] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 234.346726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.355393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.363378] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.369786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.379680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 234.388864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.396765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.404805] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.411220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.424083] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 234.432102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.442379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 234.452554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 234.460380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.468612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.476505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.486609] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 234.494115] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.503826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.511945] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.528215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 234.537074] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 234.545506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.553177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.560954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.569065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.580105] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 234.586175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.600769] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 234.612386] 8021q: adding VLAN 0 to HW filter on device batadv0 20:23:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x2000, 0x44) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) io_submit(0x0, 0x0, 0x0) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:24 executing program 0: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000008d80)=0x20, 0x4) r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 20:23:24 executing program 5: syz_mount_image$hfsplus(&(0x7f0000000600)='hfsplus\x00', &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:24 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'cpu'}]}, 0x5) 20:23:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind(r0, &(0x7f0000000000)=@in={0x10}, 0x10) [ 234.755831] hfsplus: unable to find HFS+ superblock 20:23:24 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) [ 234.823696] hfsplus: unable to find HFS+ superblock 20:23:24 executing program 3: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000006c0)) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5ed, 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)=0x41a) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) accept4$packet(r0, 0x0, &(0x7f0000000400), 0x80000) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x1) 20:23:24 executing program 5: socket(0x10, 0x3, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fanotify_init(0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRES32=r1]}) 20:23:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x2000, 0x44) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) io_submit(0x0, 0x0, 0x0) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:24 executing program 0: mprotect(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0) dup(0xffffffffffffffff) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000000)) mlockall(0x2000000000001) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 20:23:24 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) msgget$private(0x0, 0x1047f) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) [ 235.081901] audit: type=1800 audit(1564431804.565:57): pid=8390 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="ramfs" ino=29929 res=0 20:23:24 executing program 3: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000006c0)) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5ed, 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)=0x41a) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) accept4$packet(r0, 0x0, &(0x7f0000000400), 0x80000) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x1) 20:23:24 executing program 4: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 20:23:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x1f1}, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 20:23:24 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) msgget$private(0x0, 0x1047f) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000003c0)=0x499, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000003a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 20:23:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0xfffffd55) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000040000008600000001"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc020660b, 0x20000001) 20:23:24 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000280), 0xcc) 20:23:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) read(r0, &(0x7f0000000600)=""/4096, 0x33fba4ac4db4b37) 20:23:25 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0xa, 0x0, [{0x40000007, 0x0, 0x0, 0x5}, {0x7, 0xff, 0x20, 0x479}, {0x4000000b, 0xfff, 0xb05e, 0x0, 0x8000}, {0x2, 0x200, 0x20, 0xfffffffffffffff8, 0x4}, {0x0, 0x0, 0xffff, 0x73b4}, {0x6, 0x6, 0xad6, 0x6, 0x10000}, {0x80000019, 0x9, 0xffffffffffffff50, 0x1, 0x7}, {0x0, 0x5, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x400, 0x5, 0xba}, {0x40000000, 0x401, 0x0, 0x8001}]}) msgget$private(0x0, 0x1047f) sendmmsg(r1, &(0x7f0000007e00), 0x4d2, 0x4008000) [ 235.571260] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:23:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f0000000040), 0xbc78) 20:23:25 executing program 0: socketpair$unix(0x1, 0x100000000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2800080001, 0x84) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x29fcc}], 0x1}, 0x0) 20:23:25 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="580000000000000014010000090000000000000292941cce83dfb7603828effb837330be7338c700f53721d3f5357e0b7f11b173f2e07e4500e752426d2002743e20388749a06c426f9462b55156623ca914cc0a7379dc0a786bc0a19bbf5416df6bc89a6a47e96eead42a51e5f4d8163ea97fa29956c8a9d7a8f5c5f1", @ANYPTR=&(0x7f0000000800)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000840)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00'/48], 0x58}, 0x0) 20:23:25 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x11, &(0x7f0000000040), 0xbc78) 20:23:25 executing program 5: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)=""/153) 20:23:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) 20:23:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0xfffffffffffffffd) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 20:23:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:25 executing program 0: socket$inet(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x3, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000500)={0xbe, 0x80000001, 0xb95d}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000340)=@ng={0x4, 0xf, "6988b6a27c30170438d3ba5ca8c18c078a"}, 0x13, 0x2) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) 20:23:25 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000160007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 20:23:25 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:25 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f00000005c0)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) 20:23:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) 20:23:26 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) 20:23:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000014c0)={0x0, 0xfffffffffffffdf5, 0x0}, 0x0) write$cgroup_pid(r1, 0x0, 0x0) close(r3) 20:23:26 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="580000000000000014010000080003000000000000000000", @ANYPTR, @ANYPTR, @ANYBLOB='\x00'/48], 0x58}, 0x0) 20:23:26 executing program 0: socket$inet(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x3, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000500)={0xbe, 0x80000001, 0xb95d}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000340)=@ng={0x4, 0xf, "6988b6a27c30170438d3ba5ca8c18c078a"}, 0x13, 0x2) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) 20:23:26 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:26 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) fsync(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:26 executing program 5: socket$kcm(0x29, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 20:23:26 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:23:26 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 20:23:26 executing program 0: io_setup(0x1000, &(0x7f0000000180)=0x0) io_destroy(r0) 20:23:26 executing program 1: open(&(0x7f000000fffa)='./bus\x00', 0x141446, 0x0) 20:23:26 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xfffffffffffffd88) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:26 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:26 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 237.613347] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 237.730391] audit: type=1400 audit(1564431807.215:58): avc: denied { map } for pid=8550 comm="syz-executor.1" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=31187 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 20:23:27 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x1bc, 0xb80b) 20:23:28 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:28 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:28 executing program 4: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:28 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:28 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) creat(0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') 20:23:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000800)=ANY=[@ANYBLOB], 0x1}}, 0xc044) [ 238.951061] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 238.965986] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:28 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:28 executing program 0: shmget(0x3, 0x4000, 0x0, &(0x7f0000ff7000/0x4000)=nil) 20:23:28 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) unlink(&(0x7f0000000000)='./file0\x00') r1 = gettid() mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000080)='.\x00', 0x0, 0x10002010, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x400000000001f) ftruncate(0xffffffffffffffff, 0x0) 20:23:28 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:28 executing program 4: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) utimensat(r0, 0x0, 0x0, 0x0) 20:23:28 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 239.371000] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:29 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000003c0)=0x499, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x144, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700)=[{&(0x7f00000002c0)=""/225, 0xe1}], 0x1, &(0x7f0000003780)=""/232, 0xe8}}, {{&(0x7f0000003880)=@xdp, 0x80, &(0x7f0000000040), 0x8a, &(0x7f00000039c0)=""/111, 0x6f}}], 0x8000078, 0x2, &(0x7f0000003bc0)={0x0, r1+30000000}) 20:23:29 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:23:29 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:29 executing program 5: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, 0x0) 20:23:29 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:29 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0x5, 0x0, 0xff) [ 239.596967] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 239.599757] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:23:29 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 20:23:29 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x29, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x4, 0x1}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x5}}, 0x10) sendmsg$kcm(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001200)=[{0x0}, {0x0}, {&(0x7f00000010c0)}], 0x3, &(0x7f00000012c0)=""/158, 0x9e}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) 20:23:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="24000000180007041dfffd946f6105000a0000001f00000001020800080017c00000ff7e28", 0x25}], 0x1}, 0x0) [ 239.875815] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:29 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:29 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) 20:23:30 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:23:30 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000080)=[{}], 0x1, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:23:30 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:30 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 20:23:30 executing program 0: mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000480)=',') [ 241.456166] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:31 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:31 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 241.737826] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 241.802047] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:31 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) 20:23:31 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) getpid() openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:31 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 241.984070] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:31 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:31 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:31 executing program 4: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:31 executing program 5: pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000006c0)=0x200) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5ed, 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)=0x41a) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000740)='c\x16\x954\x87M\x97-\xc5a\xa1\xba\x80ifs.idmap\x00\x04q+O\xebK\x14 #\xf3L[\x9b\xa0\xec\n\xa48\x9a\xdep=\x1b,X\x0e\x06\x9d}0\x85\x14H\xfan\xa6\x94x\x12nj\xd6\xbc\x9b\x84\\\x02\xabW\x96\xd9D\xf0f\x1d\x91\xff\x96N\xf6\xea\xb4\x18\xe9\x92\xb1%\x7f\alo4\xd1S\xc5\xd7\x99\x18\xa6X\x93\xa8\xa4\xc5\xf3\x0f\xa2\xed\x8c\xb2w\v#\x8ci\xfb\x1eA\x0f\re\x9b\x9e\xf6\xb6\xeb;\xc72\x87\xcd\x858\xc4jA\xf5)\xea\x1c\xff\xae\t2\x18=\'\xda\xb0\x19\x81\xc4\x8c \xe6\r\xe4\xd9\xc1W\x11S\xac\xc7\x89y\x00\x8c~ \n\xb8\xaf\xa1\xcb\xdd\xf6V\xf2\x89r\xca\xfe$\xeb;\x85|2\n\xa0\xe1\xf3 #I\xa7k\xe6,\x10\xdf\xb4\x91O\xaf\xac\xc3\xb6\x80\xf7\xe0\xd1\xc7\xbf\xd1w\v!\x93!s\xd0\xc7\xbc\x903\xc4/\x96z\x05\x96xy\x02\xbe\x02p\x81\x00\x00\x00j\xeb\xda\xe5\xc8R\x10z-\xd8\x8cW\x87\xb5r\x97\xe5\xbfcD\x8c\v\xcbC\xe9<\xbbCw\xc7\x83\xc9&q\x9bl\xafH\xb8\x9e2z\xd9~\x95\xe1\xf9\x7f\xfb\xff\x83\xe7\x89\x9c#]\x1d5\xfe\xe1\x80\xc8\xe1D\x1a\xda\xab\xb1\x8c\xad\x94\x80\x8f\xf6\x8c\x17\xf1\xf0\xc2{\xf7\xaa\xf7\xa9\x8b\x88\xcc\xf7t\xd6\x8f\x15\xff\tw\x15\f\x00\xbe\xe3O\xbf\xf1F\x9e0\xb3\xf2\xc0#\xc74\xc6\x8e\x83\x83a2\xd1\xdf/\xc9\x87o\x91\x1c \x16\x17g\x91*\xc2s\xef\xa8\xbb3\x91\xf3mS\xf2\xa77\xfb\xea\xc4Y\xaf\x0fk\xf0Lp\xf15K\x17\x9d\xeb\x02\x85m\x10\xd13\xe9\x9e\x1f\xc7\xe8\xd5\x1f#\xaat)\x19\xc1\\\xf8\x1a\xef\xa0\xdcSH\x0f\x9bc\x99pV\x8d\x9cL\xb5\xb0L$\x1c\x99\x8cR`9\xa0y\xfa1\xf5Q\xdc\xab\xb3\x11P\xd1\xf8m^\xa7~\xb1\x91k\x1bT', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) accept4$packet(r1, 0x0, &(0x7f0000000400), 0x80000) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x1) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) 20:23:31 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:31 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 20:23:32 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:32 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:32 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) [ 242.742411] net_ratelimit: 4 callbacks suppressed [ 242.742457] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) 20:23:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000800)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000240)='threaded\x00', 0xfffffefe) 20:23:33 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:33 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x16, 0x2, &(0x7f0000000040)=@raw=[@initr0], &(0x7f0000000080)='GPL\x00', 0x7, 0xf4, &(0x7f00000001c0)=""/244, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:23:33 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:33 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 243.891439] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:33 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 243.987543] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 244.001202] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) [ 244.155326] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:33 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:33 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:33 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:33 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) [ 244.431369] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 244.471173] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004200)=[{{&(0x7f0000000240)=@xdp, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)=""/86, 0x56}, {&(0x7f0000001040)=""/4096, 0x1000}], 0x2}, 0x6}], 0x2, 0x0, 0x0) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000160007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 20:23:34 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:34 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x29, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x4, 0x1}, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8, 0x1f, 0x3}, &(0x7f00000002c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0, r1}}, 0xff79) sendmsg$kcm(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r2, &(0x7f0000001380)={&(0x7f0000000b80)=@isdn, 0x80, &(0x7f0000001200)=[{0x0}, {&(0x7f0000000cc0)=""/251, 0xfb}, {&(0x7f0000000dc0)=""/70, 0x46}, {0x0}, {&(0x7f0000000fc0)=""/198, 0xc6}, {&(0x7f00000010c0)}, {0x0}], 0x7, &(0x7f00000012c0)=""/158, 0x9e}, 0x2000) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000005c0)=""/106, 0x6a}, {0x0}, {0x0}, {&(0x7f0000000780)=""/130, 0x82}], 0x4, &(0x7f00000003c0)=""/53, 0x35}, 0x100) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xe5f, 0x0, 0x2, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0xe4, 0x4e, 0x4f15, 0x100000002, 0x80000001, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, 0x200, 0x9, 0x4e, 0x0, 0xa169, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x8, 0xffffffff, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 20:23:34 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) [ 244.932419] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:34 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:34 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:34 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:34 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 245.425819] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:34 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:35 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:35 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 245.826576] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:35 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:35 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:35 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:35 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:35 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x29, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x4, 0x1}, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8, 0x1f, 0x3}, &(0x7f00000002c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0, r1}}, 0xff79) sendmsg$kcm(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r2, &(0x7f0000001380)={&(0x7f0000000b80)=@isdn, 0x80, &(0x7f0000001200)=[{0x0}, {&(0x7f0000000cc0)=""/251, 0xfb}, {&(0x7f0000000dc0)=""/70, 0x46}, {0x0}, {&(0x7f0000000fc0)=""/198, 0xc6}, {&(0x7f00000010c0)}, {0x0}], 0x7, &(0x7f00000012c0)=""/158, 0x9e}, 0x2000) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000005c0)=""/106, 0x6a}, {0x0}, {0x0}, {&(0x7f0000000780)=""/130, 0x82}], 0x4, &(0x7f00000003c0)=""/53, 0x35}, 0x100) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r4, 0x6609, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xe5f, 0x0, 0x2, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0xe4, 0x4e, 0x4f15, 0x100000002, 0x80000001, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, 0x200, 0x9, 0x4e, 0x0, 0xa169, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x8, 0xffffffff, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 20:23:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000000)=[{r0, 0x2001}], 0x1, 0xffffffff) shutdown(r0, 0x0) 20:23:36 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000080)) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:36 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="39000000140081ae00002c000500018701546fabca1b4e165a307db89c40ebb3f7ffffffffffffffb4e921556b3d5df5000000000000000000", 0x39}], 0x1}, 0x0) 20:23:36 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:36 executing program 4: migrate_pages(0x0, 0x100, 0x0, 0x0) 20:23:36 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='hybla\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x100000530) 20:23:36 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:36 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000540)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:36 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="58000000000000001401000008000300"], 0x10}, 0x0) 20:23:36 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f0000000340)={@void, @val={0x1}, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x82, 0x0, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x4]}}}}}}, 0xff23) 20:23:36 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101007, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2814020, &(0x7f0000000440)=ANY=[@ANYBLOB='u']) 20:23:36 executing program 2: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:36 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:36 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:37 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @remote}}}, 0x88) 20:23:37 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:37 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:37 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:38 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:38 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:38 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:38 executing program 5: poll(&(0x7f0000000080), 0x2000000000000030, 0x0) 20:23:38 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x29, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x4, 0x1}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$kcm(r0, 0x0, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r1, &(0x7f0000001380)={&(0x7f0000000b80)=@isdn, 0x80, &(0x7f0000001200)=[{0x0}, {&(0x7f0000000cc0)=""/251, 0xfb}, {&(0x7f0000000dc0)=""/70, 0x46}, {0x0}, {&(0x7f0000000fc0)=""/198, 0xc6}, {&(0x7f00000010c0)}, {0x0}], 0x7, &(0x7f00000012c0)=""/158, 0x9e}, 0x2000) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6609, 0x0) 20:23:38 executing program 5: sysinfo(0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev}, 0x10) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x400) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0xfffffffffffffcb9) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x0, 0x0, 0x3}}, 0x30) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 20:23:38 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:38 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:38 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x1) r0 = socket$inet(0xa, 0x801, 0x84) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x0) fanotify_mark(r1, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') listen(r0, 0xfff) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[], 0xff42) shutdown(0xffffffffffffffff, 0x1) 20:23:38 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:38 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:38 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:39 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) 20:23:39 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:39 executing program 4: request_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) 20:23:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:39 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x100000001}], 0x0, &(0x7f0000000140)={[{@subvolid={'subvolid', 0x3d, 0x4976a781}}], [{@measure='measure'}]}) [ 249.988392] net_ratelimit: 3 callbacks suppressed [ 249.988436] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:39 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x40000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00691f"], 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:23:39 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:39 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:39 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:39 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x29, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x4, 0x1}, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8, 0x1f, 0x3}, &(0x7f00000002c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0, r1}}, 0xff79) sendmsg$kcm(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r2, &(0x7f0000001380)={&(0x7f0000000b80)=@isdn, 0x80, &(0x7f0000001200)=[{0x0}, {&(0x7f0000000cc0)=""/251, 0xfb}, {0x0}, {&(0x7f0000000fc0)=""/198, 0xc6}, {&(0x7f00000010c0)}, {0x0}], 0x6}, 0x2000) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000005c0)=""/106, 0x6a}, {0x0}, {0x0}, {&(0x7f0000000780)=""/130, 0x82}], 0x4, &(0x7f00000003c0)=""/53, 0x35}, 0x100) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xe5f, 0x0, 0x2, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0xe4, 0x4e, 0x4f15, 0x100000002, 0x80000001, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, 0x200, 0x9, 0x4e, 0x0, 0xa169, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x8, 0xffffffff, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 20:23:39 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:40 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:40 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:40 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:40 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x40000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00691f"], 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:23:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) [ 250.893901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:40 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:40 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:40 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:40 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:40 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000300)={{0x0, 0xfff}, 'port1\x00', 0x41, 0x30, 0x4, 0x3, 0x5, 0x8001, 0x69, 0x0, 0x0, 0x3ff}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 251.377084] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:41 executing program 4: r0 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x29, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x4, 0x1}, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8, 0x1f, 0x3}, &(0x7f00000002c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x5}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, 0x0, r1}}, 0xff79) sendmsg$kcm(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r2, &(0x7f0000001380)={&(0x7f0000000b80)=@isdn, 0x80, &(0x7f0000001200)=[{0x0}, {&(0x7f0000000cc0)=""/251, 0xfb}, {0x0}, {&(0x7f0000000fc0)=""/198, 0xc6}, {&(0x7f00000010c0)}, {0x0}], 0x6}, 0x2000) recvmsg(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000005c0)=""/106, 0x6a}, {0x0}, {0x0}, {&(0x7f0000000780)=""/130, 0x82}], 0x4, &(0x7f00000003c0)=""/53, 0x35}, 0x100) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r4, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0xe5f, 0x0, 0x2, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0xe4, 0x4e, 0x4f15, 0x100000002, 0x80000001, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, 0x200, 0x9, 0x4e, 0x0, 0xa169, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x8, 0xffffffff, 0x7, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 20:23:41 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) [ 251.495753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:41 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:41 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:41 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:41 executing program 5: bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x40000003e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00691f"], 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:23:41 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) [ 251.791420] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:41 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:41 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:41 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 252.122114] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:41 executing program 0: socket$unix(0x1, 0x5, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:41 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 252.433211] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:42 executing program 4: socketpair$unix(0x1, 0x400000000000002, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00002ffff6)=@file={0x0, './file0\x00'}, 0xa) 20:23:42 executing program 0: socket$unix(0x1, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:42 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:42 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000019c0)=ANY=[@ANYBLOB="00000000000000000900000080000000010000000000000001"]) 20:23:42 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:42 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) [ 252.909163] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:42 executing program 4: r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r1, r0) 20:23:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:42 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:42 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000002c0)) 20:23:42 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x1) r0 = socket$inet(0xa, 0x801, 0x84) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x0) fanotify_mark(r1, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') listen(r0, 0xfff) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[], 0xff42) shutdown(0xffffffffffffffff, 0x0) [ 253.128393] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:42 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d3abc7990d535c9e70bc111c8eff7f0000000000004e0000", 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000240)="e2c6e38c541d5933c20aea73b7d3d245ea092747bd4e581743e546cc2433af3a49", 0x21, 0x0, 0x0, 0x0) 20:23:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x1) r0 = socket$inet(0xa, 0x801, 0x84) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x0) fanotify_mark(r1, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)='./file0\x00') listen(r0, 0xfff) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[], 0xff42) shutdown(0xffffffffffffffff, 0x0) 20:23:43 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:43 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x4924924924925ac, 0x48040) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) 20:23:43 executing program 5: write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000340)=@ng, 0x2, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) 20:23:43 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:43 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:43 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) 20:23:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x3e8, 0x0, 0x0) 20:23:43 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:43 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:44 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:44 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) 20:23:44 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:44 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:44 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockname$netrom(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140), &(0x7f0000000280)=0x4) 20:23:44 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) writev(r0, 0x0, 0xff0b) [ 254.738183] sctp: [Deprecated]: syz-executor.4 (pid 9190) Use of int in maxseg socket option. [ 254.738183] Use struct sctp_assoc_value instead 20:23:44 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) readahead(0xffffffffffffffff, 0x0, 0x0) 20:23:44 executing program 4: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) 20:23:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:45 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:45 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) 20:23:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) 20:23:45 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) [ 256.089981] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:45 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 20:23:45 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0), 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:45 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:45 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:45 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:45 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0}, 0x0) [ 256.520245] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:46 executing program 5: io_setup(0x0, 0x0) r0 = socket$bt_hidp(0x1f, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000b80)=0xc) lstat(0x0, &(0x7f0000000c00)) fcntl$getown(r0, 0x9) getgroups(0x7, &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0xee00]) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="ed7e59aa1887ecc3f84e33c32ca1423eb25df730dd3e93c440eee4fa1ba70590dd9029f7eee622a57f0e13896883633d277fcb2904c9e4fd22d5c03c5e913fecbdd7d11d7de57ff3790dde99bea9f0d8cac50c1b04a25fc10e8cb4da0c2098149ce1fc5872046b10a0a433b85a0f14db6b9f33627363b1c4cef1e18eda444ef3ff422f022937b294f9c5f0fcac9190c1abb8115eaf66d2d7934546ce0a2c05a0fde0282ba828026d5fb39160d89b00bea7a77d5092f97c6645f1e1a3", 0xbc, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, 0xffffffffffffffff, 0x0) 20:23:46 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:46 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 256.968589] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:46 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:47 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:47 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:47 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:23:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) [ 258.135778] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:47 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 20:23:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:47 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:47 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:47 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) geteuid() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)={{0x2}, 0x86, 0x80000001, 0x1e69, 0x8, 0x0, 0x0, 0x1}) uname(&(0x7f0000000640)=""/49) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000580)={{0x0, 0x4}, 'port0\x00', 0x46, 0x40, 0x7, 0x40, 0x0, 0x80000001, 0xfffffffffffff5ad, 0x0, 0x0, 0x20}) close(0xffffffffffffffff) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005a40)='/dev/vsock\x00', 0x0, 0x0) r2 = fcntl$getown(r0, 0x9) sendmsg$unix(0xffffffffffffffff, &(0x7f0000006f80)={&(0x7f0000005a80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006ec0)=[{0x0}, {0x0}, {&(0x7f0000005d00)}, {0x0}], 0x4, &(0x7f0000006f40)=[@cred={{0x1c, 0x1, 0x2, {r2}}}], 0x20, 0x48040}, 0x4000) creat(&(0x7f0000000000)='./file0\x00', 0x1c) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x20097be3b3582087) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000140)={0x1f, {0x885, 0xfffffffeffffffff, 0x0, 0x6}, 0x9}, 0xa) getgroups(0x0, &(0x7f0000000340)) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x5) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRESOCT]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f00000004c0)={@multicast2, @rand_addr, @remote}, 0x0) fadvise64(r1, 0x0, 0x7, 0x2) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x7) fallocate(r3, 0x0, 0x0, 0x8200003) syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 258.537005] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:48 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:48 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 258.819892] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:48 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x4d2, 0x4008000) 20:23:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) 20:23:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:23:48 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 259.096636] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB='utf8']) 20:23:48 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, 0x0, 0x0, 0x4008000) 20:23:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:49 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:49 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:49 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, 0x0, 0x0, 0x4008000) 20:23:49 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:23:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 260.499232] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:50 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, 0x0, 0x0, 0x4008000) 20:23:50 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:23:50 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1000000020da) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:50 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x0) [ 260.902603] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:50 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x40000000806, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x2, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000b00)={0x74, 0xe, 0x0, 0x0, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x5}, [@generic="64932f971e47caededeac0acde03b1fbb4a68032c41e86863397de484cd5848fc5cc0249", @nested={0x3c, 0x0, [@generic="374c8bd40e2ec85fd6c588d61f7eccb5ad6a0384cba630cea591363099cd9ead75394050e8bf884832267b6d537b08827d79697a69dba10d"]}]}, 0x74}}, 0x0) fcntl$setflags(r0, 0x2, 0x1) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x8) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)={0x9}) socket$rxrpc(0x21, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 20:23:50 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000900)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/4\x00') preadv(r2, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x0) [ 261.247668] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:23:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:50 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x0) 20:23:50 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:50 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) sendmmsg(r0, &(0x7f0000001540), 0x553, 0x0) 20:23:50 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) [ 261.513912] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 261.535563] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:51 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:51 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 261.690672] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 261.836330] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:51 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) msgget$private(0x0, 0x1047f) sendmmsg(r0, &(0x7f0000007e00), 0x4d2, 0x0) 20:23:51 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r3 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) recvmsg$kcm(r3, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000580)=""/208, 0xd0}, {&(0x7f00000004c0)=""/46, 0x2e}, {0x0}, {&(0x7f0000000680)=""/158, 0x9e}, {&(0x7f0000000740)=""/46, 0x2e}, {&(0x7f0000000780)=""/187, 0xbb}, {&(0x7f0000000840)=""/188, 0xbc}, {0x0}, {&(0x7f0000000a40)=""/146, 0x92}], 0x9, &(0x7f0000000bc0)=""/194, 0xc2}, 0x1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xb2) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) getpid() socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 262.049708] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:52 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) prctl$PR_GET_KEEPCAPS(0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r3, 0x600, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000800) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000400)={0x2, 0x0, 0xfba, 0xffffffffffffffff}) listen(r1, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, 0x0, 0x70) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r2, 0x0, 0x0) write(r4, &(0x7f0000000140)="f3fbd2e58ffbc7bba0679c67fdcd14c4ac2ca59d13f3dea78d6eed67dd8f4381b16d21d186082ea9033a58f1f07f15bacab07e295bf99c00efb43b36dda8b3c81e83786c1021f6feedb7f749", 0x4c) poll(&(0x7f0000000200)=[{r0}, {r4, 0x1060}], 0x2, 0xfffffffffffffffb) r5 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 20:23:52 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00', 0x0, &(0x7f0000000200)='tmpfs\x00') 20:23:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) [ 262.595135] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 262.635222] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:52 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0}) write$evdev(r0, &(0x7f0000000180)=[{{}, 0x0, 0x5, 0x8}, {{0x77359400}, 0x17, 0x0, 0x5}, {{r1}, 0x0, 0x7}, {{0x0, 0x7530}, 0x3, 0x0, 0x8}], 0x60) finit_module(r0, &(0x7f00000005c0)='}\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=[@register_looper], 0x0, 0x0, 0x0}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = accept(r2, &(0x7f0000000840)=@can, &(0x7f0000000300)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f00000009c0)) r4 = geteuid() setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r4}, {0x1, 0xfffffffffffffff8, 0x0, 0x0, 0x6, 0xa7, 0x0, 0x4}, {0x0, 0x8, 0x9}, 0x0, 0x6e6bbf, 0x0, 0x1, 0x1}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0x0, @in6=@mcast2, 0x0, 0x3, 0x0, 0x0, 0x7, 0x7bc, 0xb5}}, 0xe8) fcntl$getown(0xffffffffffffffff, 0x9) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 20:23:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:52 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/fib_trie\x00') preadv(r0, &(0x7f0000000280)=[{0x0}, {&(0x7f00000001c0)=""/138, 0x8a}], 0x2, 0x0) [ 262.919613] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 262.925401] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:23:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:52 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0}) write$evdev(r0, &(0x7f0000000180)=[{{}, 0x0, 0x5, 0x8}, {{0x77359400}, 0x17, 0xe418}, {{r1}, 0x0, 0x7, 0x3}, {{0x0, 0x7530}, 0x3, 0x0, 0x8}], 0x60) finit_module(r0, &(0x7f00000005c0)='}\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=[@register_looper], 0x0, 0x0, 0x0}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r3 = accept(r2, &(0x7f0000000840)=@can, &(0x7f0000000300)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f00000009c0)) r4 = geteuid() getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r4}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x6, 0xa7, 0x0, 0x4}, {0x0, 0x8, 0x9, 0x2}, 0x0, 0x6e6bbf, 0x2, 0x1, 0x1}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0x0, @in6=@mcast2, 0x0, 0x3, 0x0, 0x0, 0x7, 0x7bc, 0xb5}}, 0xe8) fcntl$getown(0xffffffffffffffff, 0x9) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00') ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) socket(0x0, 0x0, 0x0) 20:23:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:53 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x2, 0x0, 0x6, 0xb9c}) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:23:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') sync_file_range(r0, 0x0, 0x0, 0x0) 20:23:53 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:53 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000030000000a00000000000000ff0200000000000000000000000000010000000000feffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000721e78111b032bc861ae1df9f3370000000000000000000000000000000000000000000000000a00000100000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f00000000000000000000000000000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000061dde823a0be11a8000020000000000000000048268288ddb23ca32a35cbaada283aec8e33ef0523a30f3ca594acdb49b983b4f0be84f8ca33f04aba87cc39712e8110655440e0fd65546c2e15bf847b49d2"], 0x210) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 20:23:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:53 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x323) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r3, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r3, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8fff) 20:23:53 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f00000001c0)) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 264.070702] audit: type=1804 audit(1564431833.555:59): pid=9533 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir267375168/syzkaller.rdz5pj/88/bus" dev="sda1" ino=16626 res=1 [ 264.174129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9540 comm=syz-executor.2 20:23:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:53 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 264.772641] audit: type=1804 audit(1564431834.255:60): pid=9541 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir267375168/syzkaller.rdz5pj/88/bus" dev="sda1" ino=16626 res=1 [ 264.815983] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9540 comm=syz-executor.2 20:23:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) 20:23:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:23:54 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000080)={0x0, 0x6}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 20:23:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000600)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x2, 0x0, 0x6, 0xb9c}) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x2f) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) fallocate(r1, 0x11, 0x0, 0x100000001) quotactl(0x201080000100, 0x0, 0x0, 0x0) 20:23:54 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0}) write$evdev(r0, &(0x7f0000000180)=[{{}, 0x0, 0x5, 0x8}, {{0x77359400}, 0x17, 0xe418, 0x5}, {{r1}, 0x0, 0x7, 0x3}, {{0x0, 0x7530}, 0x3, 0x0, 0x8}], 0x60) finit_module(r0, &(0x7f00000005c0)='}\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=[@register_looper], 0x0, 0x0, 0x0}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r3 = accept(r2, &(0x7f0000000840)=@can, &(0x7f0000000300)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, 0x0) r4 = geteuid() getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0xa, 0xa0, 0x80, 0x0, 0x0, r4}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x6, 0xa7, 0x0, 0x4}, {0x0, 0x8, 0x9, 0x2}, 0x0, 0x6e6bbf, 0x2, 0x1, 0x1}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0x0, @in6=@mcast2, 0x0, 0x3, 0x0, 0x0, 0x7, 0x7bc, 0xb5}}, 0xe8) fcntl$getown(0xffffffffffffffff, 0x9) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) 20:23:54 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) finit_module(r0, &(0x7f00000005c0)='}\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000100)=[@register_looper], 0x0, 0x0, 0x0}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r2 = accept(r1, &(0x7f0000000840)=@can, &(0x7f0000000300)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, 0x0, &(0x7f00000009c0)) geteuid() getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast2, 0x0, 0x401, 0x0, 0x0, 0xa, 0xa0, 0x80}, {0x1, 0xfffffffffffffff8, 0x0, 0xf33a, 0x6, 0xa7, 0x0, 0x4}, {0x0, 0x8, 0x9, 0x2}, 0x0, 0x6e6bbf, 0x2, 0x1, 0x1}, {{@in6=@rand_addr="bb610e26a4849bab76857bee68f70d4c", 0x4d3, 0xff}, 0x0, @in6=@mcast2, 0x0, 0x3, 0x0, 0x0, 0x7, 0x7bc, 0xb5}}, 0xe8) fcntl$getown(0xffffffffffffffff, 0x9) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00') ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) [ 265.402799] ================================================================== [ 265.410475] BUG: KASAN: use-after-free in tls_write_space+0x2b2/0x310 [ 265.417095] Read of size 1 at addr ffff888095bafb20 by task syz-executor.1/9560 [ 265.424633] [ 265.426282] CPU: 0 PID: 9560 Comm: syz-executor.1 Not tainted 4.19.62 #36 [ 265.433301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.442752] Call Trace: [ 265.445353] dump_stack+0x172/0x1f0 [ 265.449002] ? tls_write_space+0x2b2/0x310 [ 265.453256] print_address_description.cold+0x7c/0x20d [ 265.458549] ? tls_write_space+0x2b2/0x310 [ 265.462801] kasan_report.cold+0x8c/0x2ba [ 265.466970] __asan_report_load1_noabort+0x14/0x20 [ 265.471926] tls_write_space+0x2b2/0x310 [ 265.476109] ? tls_push_pending_closed_record+0x150/0x150 [ 265.481663] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 265.486700] tcp_check_space+0x430/0x720 [ 265.490778] tcp_rcv_established+0x9e9/0x1f10 [ 265.495292] ? tcp_data_queue+0x4220/0x4220 [ 265.499720] tcp_v6_do_rcv+0x4b0/0x13c0 [ 265.503713] __release_sock+0x129/0x390 [ 265.507710] release_sock+0x59/0x1c0 [ 265.511468] tls_sk_proto_close+0x691/0xa20 [ 265.515801] ? tcp_check_oom+0x560/0x560 [ 265.519880] ? tls_write_space+0x310/0x310 [ 265.524131] ? ip_mc_drop_socket+0x20c/0x270 [ 265.528557] ? __sock_release+0x89/0x2a0 [ 265.532633] inet_release+0xff/0x1e0 [ 265.536362] inet6_release+0x53/0x80 [ 265.540088] __sock_release+0xce/0x2a0 [ 265.543990] ? __sock_release+0x2a0/0x2a0 [ 265.548156] sock_close+0x1b/0x30 [ 265.551621] __fput+0x2dd/0x8b0 [ 265.554918] ____fput+0x16/0x20 [ 265.558639] task_work_run+0x145/0x1c0 [ 265.562544] exit_to_usermode_loop+0x273/0x2c0 [ 265.567142] do_syscall_64+0x53d/0x620 [ 265.571126] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.576318] RIP: 0033:0x413511 [ 265.579526] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 265.598446] RSP: 002b:00007ffc533db2b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 265.606206] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413511 [ 265.613489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 265.620772] RBP: 0000000000000001 R08: 000000008e01d8d6 R09: 000000008e01d8da [ 265.628061] R10: 00007ffc533db390 R11: 0000000000000293 R12: 000000000075bfc8 [ 265.635342] R13: 0000000000040c74 R14: 0000000000760a10 R15: ffffffffffffffff [ 265.642726] [ 265.644368] Allocated by task 9569: [ 265.648010] save_stack+0x45/0xd0 [ 265.651471] kasan_kmalloc+0xce/0xf0 [ 265.655197] kmem_cache_alloc_trace+0x152/0x760 [ 265.670248] create_ctx+0x46/0x1f0 [ 265.673801] tls_init+0x158/0x7a0 [ 265.677262] tcp_set_ulp+0x216/0x5f0 [ 265.681019] do_tcp_setsockopt.isra.0+0x321/0x2390 [ 265.685962] tcp_setsockopt+0xbe/0xe0 [ 265.689777] sock_common_setsockopt+0x94/0xd0 [ 265.694281] __sys_setsockopt+0x17a/0x280 [ 265.698435] __x64_sys_setsockopt+0xbe/0x150 [ 265.704369] do_syscall_64+0xfd/0x620 [ 265.708268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.713459] [ 265.715094] Freed by task 9560: [ 265.718396] save_stack+0x45/0xd0 [ 265.721946] __kasan_slab_free+0x102/0x150 [ 265.726205] kasan_slab_free+0xe/0x10 [ 265.730015] kfree+0xcf/0x220 [ 265.733215] tls_ctx_free.part.0+0x32/0x40 [ 265.737462] tls_sk_proto_close+0x684/0xa20 [ 265.741792] inet_release+0xff/0x1e0 [ 265.745513] inet6_release+0x53/0x80 [ 265.749236] __sock_release+0xce/0x2a0 [ 265.753131] sock_close+0x1b/0x30 [ 265.756595] __fput+0x2dd/0x8b0 [ 265.759920] ____fput+0x16/0x20 [ 265.763203] task_work_run+0x145/0x1c0 [ 265.767100] exit_to_usermode_loop+0x273/0x2c0 [ 265.771693] do_syscall_64+0x53d/0x620 [ 265.775673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.780859] [ 265.782491] The buggy address belongs to the object at ffff888095bafa40 [ 265.782491] which belongs to the cache kmalloc-512 of size 512 [ 265.796000] The buggy address is located 224 bytes inside of [ 265.796000] 512-byte region [ffff888095bafa40, ffff888095bafc40) [ 265.807898] The buggy address belongs to the page: [ 265.812841] page:ffffea000256ebc0 count:1 mapcount:0 mapping:ffff88812c3f0940 index:0xffff888095baf040 [ 265.822303] flags: 0x1fffc0000000100(slab) [ 265.826554] raw: 01fffc0000000100 ffffea0002478048 ffffea000280a248 ffff88812c3f0940 [ 265.834490] raw: ffff888095baf040 ffff888095baf040 0000000100000005 0000000000000000 [ 265.842377] page dumped because: kasan: bad access detected [ 265.848094] [ 265.849747] Memory state around the buggy address: [ 265.854684] ffff888095bafa00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 265.862055] ffff888095bafa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 265.869436] >ffff888095bafb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 265.876801] ^ [ 265.881213] ffff888095bafb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 265.888659] ffff888095bafc00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 265.896020] ================================================================== 20:23:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 265.903379] Disabling lock debugging due to kernel taint 20:23:55 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) personality(0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x323) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) r3 = socket(0x10, 0x80002, 0x0) bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r3, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r3, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r3, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8fff) 20:23:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x44) io_submit(0x0, 0x0, 0x0) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) [ 265.957038] Kernel panic - not syncing: panic_on_warn set ... [ 265.957038] [ 265.959707] kobject: 'loop4' (00000000d3c78bf7): kobject_uevent_env [ 265.965257] CPU: 1 PID: 9560 Comm: syz-executor.1 Tainted: G B 4.19.62 #36 [ 265.980041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.989401] Call Trace: [ 265.992003] dump_stack+0x172/0x1f0 [ 265.995640] ? tls_write_space+0x2b2/0x310 [ 265.999880] panic+0x263/0x507 [ 266.003077] ? __warn_printk+0xf3/0xf3 [ 266.007064] ? tls_write_space+0x2b2/0x310 [ 266.011300] ? preempt_schedule+0x4b/0x60 [ 266.015457] ? ___preempt_schedule+0x16/0x18 [ 266.019874] ? trace_hardirqs_on+0x5e/0x220 [ 266.021050] kobject: 'loop4' (00000000d3c78bf7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 266.024395] ? tls_write_space+0x2b2/0x310 [ 266.024410] kasan_end_report+0x47/0x4f [ 266.024425] kasan_report.cold+0xa9/0x2ba [ 266.046265] __asan_report_load1_noabort+0x14/0x20 [ 266.051198] tls_write_space+0x2b2/0x310 20:23:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 266.055270] ? tls_push_pending_closed_record+0x150/0x150 [ 266.060819] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 266.065953] tcp_check_space+0x430/0x720 [ 266.070027] tcp_rcv_established+0x9e9/0x1f10 [ 266.074538] ? tcp_data_queue+0x4220/0x4220 [ 266.078897] tcp_v6_do_rcv+0x4b0/0x13c0 [ 266.082885] __release_sock+0x129/0x390 [ 266.084059] audit: type=1804 audit(1564431835.565:61): pid=9589 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir764765894/syzkaller.YXkHrH/73/bus" dev="sda1" ino=16625 res=1 [ 266.086873] release_sock+0x59/0x1c0 [ 266.086891] tls_sk_proto_close+0x691/0xa20 [ 266.117141] kobject: 'loop3' (00000000e0c4b814): kobject_uevent_env [ 266.119318] ? tcp_check_oom+0x560/0x560 [ 266.119331] ? tls_write_space+0x310/0x310 [ 266.119347] ? ip_mc_drop_socket+0x20c/0x270 [ 266.119359] ? __sock_release+0x89/0x2a0 [ 266.119371] inet_release+0xff/0x1e0 [ 266.119386] inet6_release+0x53/0x80 [ 266.131375] kobject: 'loop3' (00000000e0c4b814): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 266.134167] __sock_release+0xce/0x2a0 [ 266.134182] ? __sock_release+0x2a0/0x2a0 [ 266.163297] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9593 comm=syz-executor.4 [ 266.163692] sock_close+0x1b/0x30 [ 266.163711] __fput+0x2dd/0x8b0 [ 266.190630] ____fput+0x16/0x20 [ 266.193924] task_work_run+0x145/0x1c0 [ 266.197828] exit_to_usermode_loop+0x273/0x2c0 [ 266.202404] do_syscall_64+0x53d/0x620 [ 266.206285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.211458] RIP: 0033:0x413511 [ 266.214654] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 266.234066] RSP: 002b:00007ffc533db2b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 266.241761] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413511 [ 266.249028] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 266.256372] RBP: 0000000000000001 R08: 000000008e01d8d6 R09: 000000008e01d8da [ 266.263628] R10: 00007ffc533db390 R11: 0000000000000293 R12: 000000000075bfc8 [ 266.270893] R13: 0000000000040c74 R14: 0000000000760a10 R15: ffffffffffffffff [ 266.279510] Kernel Offset: disabled [ 266.283690] Rebooting in 86400 seconds..